{"ok":true,"updatedAt":"2026-04-16T13:31:32.046Z","meta":{"updatedAt":"2026-04-16T13:31:32.046Z","total":11873,"critical":665,"high":5699,"medium":5119,"low":390,"unknown":0,"exploited":1568,"thisMonth":1988,"addedThisMonth":936,"updatedThisMonth":1264,"publishedThisMonth":1983,"last7Days":545,"last30Days":3076,"sources":{"BSI":2610,"MSRC":7667,"CISA-KEV":1568,"CVE":28},"version":"sw-v73","runId":"run_2026-04-16T13-31-10-290Z_6b16f7d92cd4"},"count":11873,"total":11873,"filteredTotal":11873,"data":[{"id":"BSI:WID-SEC-2024-0591","cve":"","title":"expat: Schwachstelle ermöglicht Denial of Service","date":"2026-04-16","published":"2026-04-16","updated":null,"source_published":"2026-04-16","source_updated":"2026-04-16","date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0591","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0591","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-16T13:31:22.415Z","source_doc_published":"2026-04-16","source_doc_updated":"2026-04-16","cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0591","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0591","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2024-0591 expat: schwachstelle ermöglicht denial of service bsi bsi"},{"id":"BSI:WID-SEC-2025-2034","cve":"","title":"Erlang/OTP: Mehrere Schwachstellen","date":"2026-04-16","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2034","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-16T10:54:05.374Z","published":"2026-04-16","source_published":"2026-04-16","source_updated":null,"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2034","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"date_basis":"bsi_portal","link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2034","added":"2026-04-16T00:00:00.000Z","primary_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2034","primary_published":"2026-02-27","primary_updated":null,"primary_kind":"bsi_portal","primary_source":"BSI","primary_id":"BSI:WID-SEC-2025-2034","primaryUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2034","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2034","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2034 erlang/otp: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2025-2227","cve":"","title":"Golang Go: Mehrere Schwachstellen","date":"2026-04-16","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2227","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-16T10:54:05.374Z","published":"2026-04-16","source_published":"2026-04-16","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2227","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2227","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2227","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2227 golang go: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2025-2298","cve":"","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-04-16","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2298","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-16T10:54:05.374Z","published":"2026-04-16","source_published":"2026-04-16","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2298","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2298","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2298","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2298 linux kernel: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2025-2407","cve":"","title":"Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-04-16","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2407","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-16T10:54:05.374Z","published":"2026-04-16","source_published":"2026-04-16","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2407","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2407","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2407","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2407 linux kernel: mehrere schwachstellen ermöglichen denial of service bsi bsi"},{"id":"BSI:WID-SEC-2025-2468","cve":"","title":"CPython: Schwachstelle ermöglicht Denial of Service","date":"2026-04-16","published":"2026-04-16","updated":null,"source_published":"2026-04-16","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2468","severity":"low","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2468","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-16T10:54:05.374Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2468","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2468","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16","severity_norm":"low","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2468 cpython: schwachstelle ermöglicht denial of service bsi bsi"},{"id":"BSI:WID-SEC-2025-2518","cve":"","title":"Red Hat Enterprise Linux (runc): Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen","date":"2026-04-16","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2518","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-16T10:54:05.374Z","published":"2026-04-16","source_published":"2026-04-16","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2518","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2518","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2518","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2518 red hat enterprise linux (runc): mehrere schwachstellen ermöglichen umgehen von sicherheitsvorkehrungen bsi bsi"},{"id":"BSI:WID-SEC-2025-2579","cve":"","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-04-16","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2579","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-16T10:54:05.374Z","published":"2026-04-16","source_published":"2026-04-16","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2579","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2579","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2579","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2579 linux kernel: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2025-2600","cve":"","title":"PostgreSQL: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-04-16","published":"2026-04-16","updated":null,"source_published":"2026-04-16","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2600","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2600","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-16T10:54:05.374Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2600","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2600","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2600 postgresql: mehrere schwachstellen ermöglichen denial of service bsi bsi"},{"id":"BSI:WID-SEC-2025-2608","cve":"","title":"Golang Go: Schwachstelle ermöglicht Denial of Service","date":"2026-04-16","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2608","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-16T10:54:05.374Z","published":"2026-04-16","source_published":"2026-04-16","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2608","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2608","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2608","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2608 golang go: schwachstelle ermöglicht denial of service bsi bsi"},{"id":"BSI:WID-SEC-2025-2638","cve":"","title":"Grub: Mehrere Schwachstellen","date":"2026-04-16","published":"2026-04-16","updated":null,"source_published":"2026-04-16","source_updated":"2026-04-16","date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2638","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2638","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-16T13:31:22.415Z","source_doc_published":"2026-04-16","source_doc_updated":"2026-04-16","cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2638","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2638","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2638 grub: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2025-2706","cve":"","title":"Python: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-04-16","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2706","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-16T10:54:05.374Z","published":"2026-04-16","source_published":"2026-04-16","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2706","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2706","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2706","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2706 python: mehrere schwachstellen ermöglichen denial of service bsi bsi"},{"id":"BSI:WID-SEC-2025-2724","cve":"","title":"Golang Go: Mehrere Schwachstellen","date":"2026-04-16","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2724","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-16T10:54:05.374Z","published":"2026-04-16","source_published":"2026-04-16","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2724","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2724","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2724","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2724 golang go: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2025-2741","cve":"","title":"cPython: Schwachstelle ermöglicht Denial of Service","date":"2026-04-16","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2741","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-16T10:54:05.374Z","published":"2026-04-16","source_published":"2026-04-16","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2741","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2741","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2741","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2741 cpython: schwachstelle ermöglicht denial of service bsi bsi"},{"id":"BSI:WID-SEC-2025-2897","cve":"","title":"Apache log4j: Schwachstelle ermöglicht Offenlegung von Informationen","date":"2026-04-16","published":"2026-04-16","updated":null,"source_published":"2026-04-16","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2897","severity":"low","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2897","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-16T10:54:05.374Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2897","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2897","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16","severity_norm":"low","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2897 apache log4j: schwachstelle ermöglicht offenlegung von informationen bsi bsi"},{"id":"BSI:WID-SEC-2026-0030","cve":"","title":"cURL: Mehrere Schwachstellen","date":"2026-04-16","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0030","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-16T10:54:05.374Z","published":"2026-04-16","source_published":"2026-04-16","source_updated":null,"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0030","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"primary_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0030","primary_published":"2026-03-04","primary_updated":null,"primary_kind":"bsi_portal","primary_source":"BSI","primary_id":"BSI:WID-SEC-2026-0030","date_basis":"bsi_portal","link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0030","primaryUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0030","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0030","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0030 curl: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0080","cve":"","title":"Microsoft Azure: Mehrere Schwachstellen","date":"2026-04-16","published":"2026-04-16","updated":null,"source_published":"2026-04-16","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0080","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0080","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T10:54:05.374Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0080","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0080","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-0080 microsoft azure: mehrere schwachstellen bsi bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16"},{"id":"BSI:WID-SEC-2026-0098","cve":"","title":"Node.js: Mehrere Schwachstellen","date":"2026-04-16","published":"2026-04-16","updated":null,"source_published":"2026-04-16","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0098","severity":"critical","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0098","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-16T10:54:05.374Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0098","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0098","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16","severity_norm":"critical","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0098 node.js: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0114","cve":"","title":"Red Hat OpenShift (github.com/sirupsen/logrus): Schwachstelle ermöglicht Denial of Service","date":"2026-04-16","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0114","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-16T13:31:22.415Z","published":"2026-04-16","source_published":"2026-04-16","source_updated":"2026-04-16","date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0114","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-04-16","source_doc_updated":"2026-04-16","cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0114","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0114","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0114 red hat openshift (github.com/sirupsen/logrus): schwachstelle ermöglicht denial of service bsi bsi"},{"id":"BSI:WID-SEC-2026-0119","cve":"","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-04-16","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0119","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-16T10:54:05.374Z","published":"2026-04-16","source_published":"2026-04-16","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0119","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0119","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0119","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0119 linux kernel: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0129","cve":"","title":"Golang Go: Mehrere Schwachstellen","date":"2026-04-16","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0129","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-16T10:54:05.374Z","published":"2026-04-16","source_published":"2026-04-16","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0129","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0129","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0129","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0129 golang go: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0209","cve":"","title":"Cpython: Mehrere Schwachstellen","date":"2026-04-16","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0209","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-16T10:54:05.374Z","published":"2026-04-16","source_published":"2026-04-16","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0209","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-03-25","source_doc_updated":"2026-03-25","cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0209","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0209","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0209 cpython: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0212","cve":"","title":"Keycloak (netty-codec-http): Schwachstelle ermöglicht Manipulation von Dateien","date":"2026-04-16","published":"2026-04-16","updated":null,"source_published":"2026-04-16","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0212","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0212","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T10:54:05.374Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0212","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0212","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-0212 keycloak (netty-codec-http): schwachstelle ermöglicht manipulation von dateien bsi bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16"},{"id":"BSI:WID-SEC-2026-0215","cve":"","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-04-16","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0215","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-16T10:54:05.374Z","published":"2026-04-16","source_published":"2026-04-16","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0215","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-03-25","source_doc_updated":"2026-03-25","cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0215","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0215","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0215 linux kernel: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0234","cve":"","title":"OpenSSL: Mehrere Schwachstellen","date":"2026-04-16","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0234","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-16T13:31:22.415Z","published":"2026-04-16","source_published":"2026-04-16","source_updated":"2026-04-16","date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0234","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-04-16","source_doc_updated":"2026-04-16","cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0234","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0234","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0234 openssl: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0242","cve":"","title":"Grafana Loki: Schwachstelle ermöglicht Offenlegung von Informationen","date":"2026-04-16","published":"2026-04-16","updated":null,"source_published":"2026-04-16","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0242","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0242","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T10:54:05.374Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0242","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0242","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-0242 grafana loki: schwachstelle ermöglicht offenlegung von informationen bsi bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16"},{"id":"BSI:WID-SEC-2026-0300","cve":"","title":"Grafana: Schwachstelle ermöglicht Manipulation von Dateien und Offenlegung von Informationen","date":"2026-04-16","published":"2026-04-16","updated":null,"source_published":"2026-04-16","source_updated":"2026-04-16","date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0300","severity":"low","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0300","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-04-16","source_doc_updated":"2026-04-16","cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T13:31:22.415Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0300","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0300","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"low","search_text":"bsi:wid-sec-2026-0300 grafana: schwachstelle ermöglicht manipulation von dateien und offenlegung von informationen bsi bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16"},{"id":"BSI:WID-SEC-2026-0302","cve":"","title":"Red Hat Enterprise Linux (python-wheel): Schwachstelle ermöglicht Privilegieneskalation und Codeausführung","date":"2026-04-16","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0302","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-16T13:31:22.415Z","published":"2026-04-16","source_published":"2026-04-16","source_updated":"2026-04-16","date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0302","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-04-16","source_doc_updated":"2026-04-16","cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0302","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0302","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0302 red hat enterprise linux (python-wheel): schwachstelle ermöglicht privilegieneskalation und codeausführung bsi bsi"},{"id":"BSI:WID-SEC-2026-0421","cve":"","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-04-16","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0421","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-16T13:31:22.415Z","published":"2026-04-16","source_published":"2026-04-16","source_updated":"2026-04-16","date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0421","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-04-16","source_doc_updated":"2026-04-16","cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0421","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0421","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0421 linux kernel: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0446","cve":"","title":"libssh: Mehrere Schwachstellen ermöglichen Manipulation von Dateien und DoS","date":"2026-04-16","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0446","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-16T13:31:22.415Z","published":"2026-04-16","source_published":"2026-04-16","source_updated":"2026-04-16","source_doc_published":"2026-04-16","source_doc_updated":"2026-04-16","cve_published":null,"cve_updated":null,"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0446","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"primary_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0446","primary_published":"2026-03-05","primary_updated":null,"primary_kind":"bsi_portal","primary_source":"BSI","primary_id":"BSI:WID-SEC-2026-0446","date_basis":"bsi_portal","link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0446","primaryUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0446","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0446","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0446 libssh: mehrere schwachstellen ermöglichen manipulation von dateien und dos bsi bsi"},{"id":"BSI:WID-SEC-2026-0480","cve":"","title":"Red Hat Enterprise Linux (Python Protobuf): Schwachstelle ermöglicht Denial of Service","date":"2026-04-16","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0480","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-16T13:31:22.415Z","published":"2026-04-16","source_published":"2026-04-16","source_updated":"2026-04-16","date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0480","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-04-16","source_doc_updated":"2026-04-16","cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0480","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0480","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0480 red hat enterprise linux (python protobuf): schwachstelle ermöglicht denial of service bsi bsi"},{"id":"BSI:WID-SEC-2026-0507","cve":"","title":"util-linux: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen","date":"2026-04-16","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0507","severity":"low","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-16T13:31:22.415Z","published":"2026-04-16","source_published":"2026-04-16","source_updated":"2026-04-16","date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0507","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-04-16","source_doc_updated":"2026-04-16","cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0507","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0507","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16","severity_norm":"low","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0507 util-linux: schwachstelle ermöglicht umgehen von sicherheitsvorkehrungen bsi bsi"},{"id":"BSI:WID-SEC-2026-0548","cve":"","title":"Golang Go: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff","date":"2026-04-16","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0548","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-16T13:31:22.415Z","published":"2026-04-16","source_published":"2026-04-16","source_updated":"2026-04-16","date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0548","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-04-16","source_doc_updated":"2026-04-16","cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0548","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0548","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0548 golang go: mehrere schwachstellen ermöglichen nicht spezifizierten angriff bsi bsi"},{"id":"BSI:WID-SEC-2026-0556","cve":"","title":"vim: Mehrere Schwachstellen","date":"2026-04-16","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0556","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-16T13:31:22.415Z","published":"2026-04-16","source_published":"2026-04-16","source_updated":"2026-04-16","date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0556","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-04-16","source_doc_updated":"2026-04-16","cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0556","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0556","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0556 vim: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0607","cve":"","title":"CPython: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen","date":"2026-04-16","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0607","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-16T13:31:22.415Z","published":"2026-04-16","source_published":"2026-04-16","source_updated":"2026-04-16","date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0607","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-04-16","source_doc_updated":"2026-04-16","cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0607","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0607","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0607 cpython: schwachstelle ermöglicht umgehen von sicherheitsvorkehrungen bsi bsi"},{"id":"BSI:WID-SEC-2026-0614","cve":"","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-04-16","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0614","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-16T13:31:22.415Z","published":"2026-04-16","source_published":"2026-04-16","source_updated":"2026-04-16","date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0614","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-04-16","source_doc_updated":"2026-04-16","cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0614","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0614","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0614 linux kernel: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0798","cve":"","title":"vim: Schwachstelle ermöglicht Codeausführung","date":"2026-04-16","published":"2026-04-16","updated":null,"source_published":"2026-04-16","source_updated":"2026-04-16","date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0798","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0798","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-16T13:31:22.415Z","source_doc_published":"2026-04-16","source_doc_updated":"2026-04-16","cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0798","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0798","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0798 vim: schwachstelle ermöglicht codeausführung bsi bsi"},{"id":"BSI:WID-SEC-2026-0863","cve":"","title":"Internet Systems Consortium BIND: Mehrere Schwachstellen","date":"2026-04-16","published":"2026-04-16","updated":null,"source_published":"2026-04-16","source_updated":"2026-04-16","date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0863","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0863","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-16T13:31:22.415Z","source_doc_published":"2026-04-16","source_doc_updated":"2026-04-16","cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0863","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0863","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0863 internet systems consortium bind: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0915","cve":"","title":"Kyocera Drucker: Mehrere Schwachstellen","date":"2026-04-16","published":"2026-04-16","updated":null,"source_published":"2026-04-16","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0915","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0915","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-16T09:01:01.363Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0915","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0915","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0915 kyocera drucker: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0931","cve":"","title":"nginx-ui: Mehrere Schwachstellen","date":"2026-04-16","published":"2026-04-16","updated":null,"source_published":"2026-04-16","source_updated":"2026-04-16","date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0931","severity":"critical","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0931","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-16T13:31:22.415Z","source_doc_published":"2026-04-16","source_doc_updated":"2026-04-16","cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0931","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0931","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16","severity_norm":"critical","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0931 nginx-ui: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0991","cve":"","title":"Apache ActiveMQ, Client, Broker und Web: Mehrere Schwachstellen","date":"2026-04-16","published":"2026-04-16","updated":null,"source_published":"2026-04-16","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0991","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0991","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T09:01:01.363Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0991","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0991","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-0991 apache activemq, client, broker und web: mehrere schwachstellen bsi bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16"},{"id":"BSI:WID-SEC-2026-1130","cve":"","title":"Google Chrome: Mehrere Schwachstellen","date":"2026-04-16","published":"2026-04-16","updated":null,"source_published":"2026-04-16","source_updated":"2026-04-16","date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1130","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1130","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-04-16","source_doc_updated":"2026-04-16","cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T13:31:22.415Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1130","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1130","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1130 google chrome: mehrere schwachstellen bsi bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16"},{"id":"BSI:WID-SEC-2026-1131","cve":"","title":"Cisco Secure Web Appliance (AsyncOS): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen","date":"2026-04-16","published":"2026-04-16","updated":null,"source_published":"2026-04-16","source_updated":"2026-04-16","date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1131","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1131","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-04-16","source_doc_updated":"2026-04-16","cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T13:31:22.415Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1131","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1131","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1131 cisco secure web appliance (asyncos): schwachstelle ermöglicht umgehen von sicherheitsvorkehrungen bsi bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16"},{"id":"BSI:WID-SEC-2026-1132","cve":"","title":"Cisco WebEx: Mehrere Schwachstellen","date":"2026-04-16","published":"2026-04-16","updated":null,"source_published":"2026-04-16","source_updated":"2026-04-16","date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1132","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1132","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-04-16","source_doc_updated":"2026-04-16","cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T13:31:22.415Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1132","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1132","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1132 cisco webex: mehrere schwachstellen bsi bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16"},{"id":"BSI:WID-SEC-2026-1133","cve":"","title":"Yubico YubiKey Manager: Schwachstelle ermöglicht Codeausführung","date":"2026-04-16","published":"2026-04-16","updated":null,"source_published":"2026-04-16","source_updated":"2026-04-16","date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1133","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1133","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-04-16","source_doc_updated":"2026-04-16","cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T13:31:22.415Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1133","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1133","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1133 yubico yubikey manager: schwachstelle ermöglicht codeausführung bsi bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16"},{"id":"BSI:WID-SEC-2026-1134","cve":"","title":"IBM DB2: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-04-16","published":"2026-04-16","updated":null,"source_published":"2026-04-16","source_updated":"2026-04-16","date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1134","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1134","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-04-16","source_doc_updated":"2026-04-16","cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T13:31:22.415Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1134","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1134","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1134 ibm db2: mehrere schwachstellen ermöglichen denial of service bsi bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16"},{"id":"BSI:WID-SEC-2026-1135","cve":"","title":"Budibase: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen","date":"2026-04-16","published":"2026-04-16","updated":null,"source_published":"2026-04-16","source_updated":"2026-04-16","date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1135","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1135","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-04-16","source_doc_updated":"2026-04-16","cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T13:31:22.415Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1135","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1135","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1135 budibase: schwachstelle ermöglicht umgehen von sicherheitsvorkehrungen bsi bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16"},{"id":"BSI:WID-SEC-2026-1136","cve":"","title":"Red Hat OpenShift Container Platform (gRPC-Go): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen","date":"2026-04-16","published":"2026-04-16","updated":null,"source_published":"2026-04-16","source_updated":"2026-04-16","date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1136","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1136","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-04-16","source_doc_updated":"2026-04-16","cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T13:31:22.415Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1136","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1136","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1136 red hat openshift container platform (grpc-go): schwachstelle ermöglicht umgehen von sicherheitsvorkehrungen bsi bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16"},{"id":"BSI:WID-SEC-2026-1137","cve":"","title":"Grafana: Schwachstelle ermöglicht Offenlegung von Informationen","date":"2026-04-16","published":"2026-04-16","updated":null,"source_published":"2026-04-16","source_updated":"2026-04-16","date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1137","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1137","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-04-16","source_doc_updated":"2026-04-16","cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T13:31:22.415Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1137","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1137","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1137 grafana: schwachstelle ermöglicht offenlegung von informationen bsi bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16"},{"id":"BSI:WID-SEC-2026-1138","cve":"","title":"Sonatype Nexus Repository Manager: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen und potenziell Codeausführung","date":"2026-04-16","published":"2026-04-16","updated":null,"source_published":"2026-04-16","source_updated":"2026-04-16","date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1138","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1138","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-04-16","source_doc_updated":"2026-04-16","cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T13:31:22.415Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1138","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1138","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1138 sonatype nexus repository manager: schwachstelle ermöglicht umgehen von sicherheitsvorkehrungen und potenziell codeausführung bsi bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16"},{"id":"BSI:WID-SEC-2026-1139","cve":"","title":"Splunk Splunk Enterprise: Mehrere Schwachstellen","date":"2026-04-16","published":"2026-04-16","updated":null,"source_published":"2026-04-16","source_updated":"2026-04-16","date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1139","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1139","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-04-16","source_doc_updated":"2026-04-16","cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T13:31:22.415Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1139","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1139","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1139 splunk splunk enterprise: mehrere schwachstellen bsi bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16"},{"id":"BSI:WID-SEC-2026-1140","cve":"","title":"Pega Platform: Mehrere Schwachstellen","date":"2026-04-16","published":"2026-04-16","updated":null,"source_published":"2026-04-16","source_updated":"2026-04-16","date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1140","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1140","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-04-16","source_doc_updated":"2026-04-16","cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T13:31:22.415Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1140","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1140","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1140 pega platform: mehrere schwachstellen bsi bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16"},{"id":"BSI:WID-SEC-2026-1141","cve":"","title":"Rapid7 Velociraptor: Mehrere Schwachstellen","date":"2026-04-16","published":"2026-04-16","updated":null,"source_published":"2026-04-16","source_updated":"2026-04-16","date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1141","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1141","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-04-16","source_doc_updated":"2026-04-16","cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T13:31:22.415Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1141","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1141","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1141 rapid7 velociraptor: mehrere schwachstellen bsi bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16"},{"id":"BSI:WID-SEC-2026-1142","cve":"","title":"OpenClaw: Schwachstelle ermöglicht Manipulation von Dateien","date":"2026-04-16","published":"2026-04-16","updated":null,"source_published":"2026-04-16","source_updated":"2026-04-16","date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1142","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1142","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-04-16","source_doc_updated":"2026-04-16","cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T13:31:22.415Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1142","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1142","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1142 openclaw: schwachstelle ermöglicht manipulation von dateien bsi bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16"},{"id":"BSI:WID-SEC-2026-1143","cve":"","title":"ffmpeg: Mehrere Schwachstellen","date":"2026-04-16","published":"2026-04-16","updated":null,"source_published":"2026-04-16","source_updated":"2026-04-16","date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1143","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1143","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-04-16","source_doc_updated":"2026-04-16","cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T13:31:22.415Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1143","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1143","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1143 ffmpeg: mehrere schwachstellen bsi bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16"},{"id":"BSI:WID-SEC-2026-1144","cve":"","title":"GIMP: Mehrere Schwachstellen","date":"2026-04-16","published":"2026-04-16","updated":null,"source_published":"2026-04-16","source_updated":"2026-04-16","date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1144","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1144","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-04-16","source_doc_updated":"2026-04-16","cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T13:31:22.415Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1144","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1144","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1144 gimp: mehrere schwachstellen bsi bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16"},{"id":"BSI:WID-SEC-2026-1145","cve":"","title":"Flowise: Mehrere Schwachstellen","date":"2026-04-16","published":"2026-04-16","updated":null,"source_published":"2026-04-16","source_updated":"2026-04-16","date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1145","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1145","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-04-16","source_doc_updated":"2026-04-16","cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T13:31:22.415Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1145","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1145","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1145 flowise: mehrere schwachstellen bsi bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16"},{"id":"BSI:WID-SEC-2026-1146","cve":"","title":"Cisco Identity Services Engine (ISE): Mehrere Schwachstellen","date":"2026-04-16","published":"2026-04-16","updated":null,"source_published":"2026-04-16","source_updated":"2026-04-16","date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1146","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1146","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-04-16","source_doc_updated":"2026-04-16","cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T13:31:22.415Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1146","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1146","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1146 cisco identity services engine (ise): mehrere schwachstellen bsi bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16"},{"id":"BSI:WID-SEC-2026-1147","cve":"","title":"vim: Schwachstelle ermöglicht Codeausführung","date":"2026-04-16","published":"2026-04-16","updated":null,"source_published":"2026-04-16","source_updated":"2026-04-16","date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1147","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1147","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-04-16","source_doc_updated":"2026-04-16","cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T13:31:22.415Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1147","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1147","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1147 vim: schwachstelle ermöglicht codeausführung bsi bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16"},{"id":"BSI:WID-SEC-2026-1148","cve":"","title":"IBM Spectrum Protect Plus: Schwachstelle ermöglicht Denial of Service","date":"2026-04-16","published":"2026-04-16","updated":null,"source_published":"2026-04-16","source_updated":"2026-04-16","date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1148","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1148","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-04-16","source_doc_updated":"2026-04-16","cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T13:31:22.415Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1148","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1148","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1148 ibm spectrum protect plus: schwachstelle ermöglicht denial of service bsi bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16"},{"id":"BSI:WID-SEC-2026-1149","cve":"","title":"Cisco Unity Connection: Mehrere Schwachstellen","date":"2026-04-16","published":"2026-04-16","updated":null,"source_published":"2026-04-16","source_updated":"2026-04-16","date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1149","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1149","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-04-16","source_doc_updated":"2026-04-16","cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T13:31:22.415Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1149","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1149","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1149 cisco unity connection: mehrere schwachstellen bsi bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16"},{"id":"BSI:WID-SEC-2026-1150","cve":"","title":"Dell Storage Manager: Schwachstelle ermöglicht Privilegieneskalation","date":"2026-04-16","published":"2026-04-16","updated":null,"source_published":"2026-04-16","source_updated":"2026-04-16","date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1150","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1150","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-04-16","source_doc_updated":"2026-04-16","cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T13:31:22.415Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1150","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1150","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1150 dell storage manager: schwachstelle ermöglicht privilegieneskalation bsi bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16"},{"id":"BSI:WID-SEC-2026-1151","cve":"","title":"Drupal Core: Mehrere Schwachstellen","date":"2026-04-16","published":"2026-04-16","updated":null,"source_published":"2026-04-16","source_updated":"2026-04-16","date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1151","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1151","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-04-16","source_doc_updated":"2026-04-16","cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T13:31:22.415Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1151","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1151","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1151 drupal core: mehrere schwachstellen bsi bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16"},{"id":"BSI:WID-SEC-2026-1152","cve":"","title":"Kyverno: Mehrere Schwachstellen","date":"2026-04-16","published":"2026-04-16","updated":null,"source_published":"2026-04-16","source_updated":"2026-04-16","date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1152","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1152","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-04-16","source_doc_updated":"2026-04-16","cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T13:31:22.415Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1152","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1152","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1152 kyverno: mehrere schwachstellen bsi bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16"},{"id":"BSI:WID-SEC-2026-1153","cve":"","title":"Apache Airflow: Schwachstelle ermöglicht Offenlegung von Informationen","date":"2026-04-16","published":"2026-04-16","updated":null,"source_published":"2026-04-16","source_updated":"2026-04-16","date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1153","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1153","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-04-16","source_doc_updated":"2026-04-16","cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T13:31:22.415Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1153","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1153","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1153 apache airflow: schwachstelle ermöglicht offenlegung von informationen bsi bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16"},{"id":"BSI:WID-SEC-2026-1154","cve":"","title":"Mattermost: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff","date":"2026-04-16","published":"2026-04-16","updated":null,"source_published":"2026-04-16","source_updated":"2026-04-16","date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1154","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1154","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-04-16","source_doc_updated":"2026-04-16","cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T13:31:22.415Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1154","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1154","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1154 mattermost: mehrere schwachstellen ermöglichen nicht spezifizierten angriff bsi bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16"},{"id":"BSI:WID-SEC-2026-1155","cve":"","title":"Microsoft Defender: Schwachstelle ermöglicht Privilegieneskalation","date":"2026-04-16","published":"2026-04-16","updated":null,"source_published":"2026-04-16","source_updated":"2026-04-16","date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1155","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1155","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-04-16","source_doc_updated":"2026-04-16","cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T13:31:22.415Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1155","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1155","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1155 microsoft defender: schwachstelle ermöglicht privilegieneskalation bsi bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16"},{"id":"BSI:WID-SEC-2026-1156","cve":"","title":"Rsync: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen","date":"2026-04-16","published":"2026-04-16","updated":null,"source_published":"2026-04-16","source_updated":"2026-04-16","date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1156","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1156","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-04-16","source_doc_updated":"2026-04-16","cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T13:31:22.415Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1156","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1156","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1156 rsync: schwachstelle ermöglicht umgehen von sicherheitsvorkehrungen bsi bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16"},{"id":"BSI:WID-SEC-2026-1157","cve":"","title":"IBM App Connect Enterprise: Mehrere Schwachstellen","date":"2026-04-16","published":"2026-04-16","updated":null,"source_published":"2026-04-16","source_updated":"2026-04-16","date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1157","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1157","published":"2026-04-16","updated":"2026-04-16","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-04-16","source_doc_updated":"2026-04-16","cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T13:31:22.415Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1157","added":"2026-04-16T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1157","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1157 ibm app connect enterprise: mehrere schwachstellen bsi bsi","public_published":"2026-04-16","public_updated":null,"public_display_date":"2026-04-16","public_sort_date":"2026-04-16","public_period_date":"2026-04-16"},{"id":"BSI:WID-SEC-2025-1452","cve":"","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-04-15","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1452","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-15T23:36:13.829Z","published":"2026-04-15","source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1452","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1452","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1452","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2025-1452 linux kernel: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2025-1740","cve":"","title":"Golang Go: Mehrere Schwachstellen ermöglichen Manipulation von Dateien","date":"2026-04-15","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1740","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-15T23:36:13.829Z","published":"2026-04-15","source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1740","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-03-25","source_doc_updated":"2026-03-25","cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1740","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1740","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2025-1740 golang go: mehrere schwachstellen ermöglichen manipulation von dateien bsi bsi"},{"id":"BSI:WID-SEC-2025-1883","cve":"","title":"Apache Tika: Schwachstelle ermöglicht Infogewinn oder Manipulation","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1883","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1883","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T23:36:13.829Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1883","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1883","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2025-1883 apache tika: schwachstelle ermöglicht infogewinn oder manipulation bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2025-1976","cve":"","title":"Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-04-15","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1976","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-15T23:36:13.829Z","published":"2026-04-15","source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1976","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1976","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1976","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2025-1976 linux kernel: mehrere schwachstellen ermöglichen denial of service bsi bsi"},{"id":"BSI:WID-SEC-2025-2040","cve":"","title":"Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-04-15","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2040","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-15T23:36:13.829Z","published":"2026-04-15","source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2040","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2040","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2040","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2040 linux kernel: mehrere schwachstellen ermöglichen denial of service bsi bsi"},{"id":"BSI:WID-SEC-2025-2392","cve":"","title":"Internet Systems Consortium BIND: Mehrere Schwachstellen","date":"2026-04-15","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2392","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-15T23:36:13.829Z","published":"2026-04-15","source_published":"2026-04-15","source_updated":null,"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2392","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"date_basis":"bsi_portal","link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2392","added":"2026-04-15T00:00:00.000Z","primary_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2392","primary_published":"2026-02-19","primary_updated":null,"primary_kind":"bsi_portal","primary_source":"BSI","primary_id":"BSI:WID-SEC-2025-2392","primaryUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2392","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2392","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2392 internet systems consortium bind: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0126","cve":"","title":"libxml2: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-04-15","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0126","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-16T09:01:01.363Z","published":"2026-04-15","source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0126","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0126","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0126","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0126 libxml2: mehrere schwachstellen ermöglichen denial of service bsi bsi"},{"id":"BSI:WID-SEC-2026-0183","cve":"","title":"InetUtils (telnetd): Schwachstelle ermöglicht Erlangen von Administratorrechten","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0183","severity":"critical","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0183","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T23:36:13.829Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0183","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0183","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"critical","search_text":"bsi:wid-sec-2026-0183 inetutils (telnetd): schwachstelle ermöglicht erlangen von administratorrechten bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-0213","cve":"","title":"expat: Schwachstelle ermöglicht Denial of Service","date":"2026-04-15","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0213","severity":"low","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-15T23:36:13.829Z","published":"2026-04-15","source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0213","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0213","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0213","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15","severity_norm":"low","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0213 expat: schwachstelle ermöglicht denial of service bsi bsi"},{"id":"BSI:WID-SEC-2026-0265","cve":"","title":"expat: Schwachstelle ermöglicht Codeausführung","date":"2026-04-15","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0265","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-15T23:36:13.829Z","published":"2026-04-15","source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0265","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0265","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0265","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0265 expat: schwachstelle ermöglicht codeausführung bsi bsi"},{"id":"BSI:WID-SEC-2026-0359","cve":"","title":"GnuTLS: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-04-15","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0359","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-15T23:36:13.829Z","published":"2026-04-15","source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0359","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-03-25","source_doc_updated":"2026-03-25","cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0359","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0359","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0359 gnutls: mehrere schwachstellen ermöglichen denial of service bsi bsi"},{"id":"BSI:WID-SEC-2026-0435","cve":"","title":"zlib: Schwachstelle ermöglicht Denial of Service","date":"2026-04-15","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0435","severity":"low","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-16T03:01:11.191Z","published":"2026-04-15","source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0435","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0435","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0435","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15","severity_norm":"low","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0435 zlib: schwachstelle ermöglicht denial of service bsi bsi"},{"id":"BSI:WID-SEC-2026-0935","cve":"","title":"Red Hat Ansible Automation Platform: Mehrere Schwachstellen","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0935","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0935","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-16T09:01:01.363Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0935","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0935","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0935 red hat ansible automation platform: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0937","cve":"","title":"Google Chrome und Microsoft Edge: Mehrere Schwachstellen","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0937","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0937","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-16T09:01:01.363Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0937","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0937","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0937 google chrome und microsoft edge: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0977","cve":"","title":"Keycloak: Mehrere Schwachstellen","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0977","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0977","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T23:36:13.829Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0977","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0977","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-0977 keycloak: mehrere schwachstellen bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-0994","cve":"","title":"CUPS: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0994","severity":"low","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0994","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T09:00:48.880Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0994","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0994","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"low","search_text":"bsi:wid-sec-2026-0994 cups: mehrere schwachstellen ermöglichen denial of service bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-0995","cve":"","title":"OpenSSL: Mehrere Schwachstellen","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0995","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0995","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T09:00:48.880Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0995","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0995","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-0995 openssl: mehrere schwachstellen bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-0997","cve":"","title":"Mozilla Firefox und Thunderbird: Mehrere Schwachstellen","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0997","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0997","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T09:00:48.880Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0997","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0997","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-0997 mozilla firefox und thunderbird: mehrere schwachstellen bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-0998","cve":"","title":"Erlang/OTP: Mehrere Schwachstellen","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0998","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0998","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T09:00:48.880Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0998","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0998","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-0998 erlang/otp: mehrere schwachstellen bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-1004","cve":"","title":"vim: Schwachstelle ermöglicht Codeausführung","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1004","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1004","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T09:00:48.880Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1004","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1004","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1004 vim: schwachstelle ermöglicht codeausführung bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-1006","cve":"","title":"Golang Go: Mehrere Schwachstellen","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1006","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1006","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T09:00:48.880Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1006","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1006","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1006 golang go: mehrere schwachstellen bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-1008","cve":"","title":"Microsoft Defender: Schwachstelle ermöglicht Privilegieneskalation","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1008","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1008","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T09:01:01.363Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1008","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1008","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1008 microsoft defender: schwachstelle ermöglicht privilegieneskalation bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-1023","cve":"","title":"libpng: Schwachstelle ermöglicht Offenlegung von Informationen","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1023","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1023","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T09:00:48.880Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1023","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1023","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1023 libpng: schwachstelle ermöglicht offenlegung von informationen bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-1048","cve":"","title":"helm: Mehrere Schwachstellen","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1048","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1048","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T09:00:48.880Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1048","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1048","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1048 helm: mehrere schwachstellen bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-1052","cve":"","title":"Red Hat Enterprise Linux (Cockpit): Schwachstelle ermöglicht Codeausführung","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1052","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1052","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T09:00:48.880Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1052","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1052","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1052 red hat enterprise linux (cockpit): schwachstelle ermöglicht codeausführung bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-1055","cve":"","title":"Red Hat Enterprise Linux (perl-xml-parser): Mehrere Schwachstellen","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1055","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1055","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T11:33:18.649Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1055","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1055","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1055 red hat enterprise linux (perl-xml-parser): mehrere schwachstellen bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-1060","cve":"","title":"libexif: Mehrere Schwachstellen ermöglichen Denial of Service und Offenlegung von Informationen","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1060","severity":"low","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1060","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T23:36:13.829Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1060","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1060","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"low","search_text":"bsi:wid-sec-2026-1060 libexif: mehrere schwachstellen ermöglichen denial of service und offenlegung von informationen bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-1067","cve":"","title":"Apache log4j: Mehrere Schwachstellen ermöglichen Manipulation von Dateien","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1067","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1067","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T23:36:13.829Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1067","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1067","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1067 apache log4j: mehrere schwachstellen ermöglichen manipulation von dateien bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-1091","cve":"","title":"Fortinet FortiWeb: Mehrere Schwachstellen","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1091","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1091","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T06:26:45.891Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1091","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1091","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1091 fortinet fortiweb: mehrere schwachstellen bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-1092","cve":"","title":"Fortinet FortiClientEMS: Mehrere Schwachstellen","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1092","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1092","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T06:26:45.891Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1092","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1092","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1092 fortinet forticlientems: mehrere schwachstellen bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-1093","cve":"","title":"Fortinet FortiAnalyzer und FortiManager: Mehrere Schwachstellen","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1093","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1093","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T06:26:45.891Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1093","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1093","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1093 fortinet fortianalyzer und fortimanager: mehrere schwachstellen bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-1094","cve":"","title":"Fortinet FortiSandbox: Mehrere Schwachstellen","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1094","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1094","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T06:26:45.891Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1094","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1094","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1094 fortinet fortisandbox: mehrere schwachstellen bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-1095","cve":"","title":"Fortinet FortiOS: Schwachstelle ermöglicht Manipulation von Dateien","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1095","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1095","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T06:26:45.891Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1095","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1095","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1095 fortinet fortios: schwachstelle ermöglicht manipulation von dateien bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-1096","cve":"","title":"Fortinet FortiOS, FortiProxy und FortiSwitch: Schwachstelle ermöglicht Manipulation von Dateien","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1096","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1096","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T06:26:45.891Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1096","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1096","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1096 fortinet fortios, fortiproxy und fortiswitch: schwachstelle ermöglicht manipulation von dateien bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-1097","cve":"","title":"Fortinet FortiVoice: Schwachstelle ermöglicht Offenlegung von Informationen","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1097","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1097","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T06:26:45.891Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1097","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1097","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1097 fortinet fortivoice: schwachstelle ermöglicht offenlegung von informationen bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-1098","cve":"","title":"Microsoft Azure: Mehrere Schwachstellen ermöglichen Privilegieneskalation","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1098","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1098","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T06:26:45.891Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1098","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1098","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1098 microsoft azure: mehrere schwachstellen ermöglichen privilegieneskalation bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-1099","cve":"","title":"Microsoft Defender: Schwachstelle ermöglicht Erlangen von Administratorrechten","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1099","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1099","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T09:01:01.363Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1099","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1099","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1099 microsoft defender: schwachstelle ermöglicht erlangen von administratorrechten bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-1100","cve":"","title":"Microsoft DeveloperTools: Mehrere Schwachstellen","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1100","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1100","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T06:26:45.891Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1100","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1100","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1100 microsoft developertools: mehrere schwachstellen bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-1106","cve":"","title":"Adobe Experience Manager Screens: Mehrere Schwachstellen ermöglichen Cross-Site Scripting","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1106","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1106","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T23:36:13.829Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1106","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1106","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1106 adobe experience manager screens: mehrere schwachstellen ermöglichen cross-site scripting bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-1107","cve":"","title":"Adobe Acrobat DC, Acrobat Reader DC und Acrobat Reader: Mehrere Schwachstellen","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1107","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1107","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T23:36:13.829Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1107","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1107","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1107 adobe acrobat dc, acrobat reader dc und acrobat reader: mehrere schwachstellen bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-1108","cve":"","title":"Adobe FrameMaker: Mehrere Schwachstellen","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1108","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1108","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T23:36:13.829Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1108","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1108","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1108 adobe framemaker: mehrere schwachstellen bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-1109","cve":"","title":"Adobe Connect: Mehrere Schwachstellen","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1109","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1109","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T23:36:13.829Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1109","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1109","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1109 adobe connect: mehrere schwachstellen bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-1110","cve":"","title":"Adobe ColdFusion: Mehrere Schwachstellen","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1110","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1110","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T23:36:13.829Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1110","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1110","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1110 adobe coldfusion: mehrere schwachstellen bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-1111","cve":"","title":"AMD Prozessoren: Mehrere Schwachstellen","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1111","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1111","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T09:01:01.363Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1111","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1111","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1111 amd prozessoren: mehrere schwachstellen bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-1112","cve":"","title":"Red Hat Enterprise Linux (pcs): Schwachstelle ermöglicht Denial of Service","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1112","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1112","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T09:01:01.363Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1112","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1112","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1112 red hat enterprise linux (pcs): schwachstelle ermöglicht denial of service bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-1113","cve":"","title":"Adobe Creative Cloud Applikationen: Mehrere Schwachstellen","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1113","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1113","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T09:01:01.363Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1113","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1113","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1113 adobe creative cloud applikationen: mehrere schwachstellen bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-1114","cve":"","title":"Adobe Photoshop: Schwachstelle ermöglicht Codeausführung","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1114","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1114","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T09:01:01.363Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1114","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1114","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1114 adobe photoshop: schwachstelle ermöglicht codeausführung bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-1115","cve":"","title":"Podman HyperV Machine: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1115","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1115","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T09:01:01.363Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1115","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1115","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1115 podman hyperv machine: schwachstelle ermöglicht ausführen von beliebigem programmcode mit administratorrechten bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-1116","cve":"","title":"Red Hat OpenStack Keystone: Schwachstelle ermöglicht Privilegieneskalation","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1116","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1116","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T09:01:01.363Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1116","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1116","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1116 red hat openstack keystone: schwachstelle ermöglicht privilegieneskalation bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-1117","cve":"","title":"IBM Spectrum Protect Plus: Mehrere Schwachstellen","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1117","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1117","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T09:01:01.363Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1117","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1117","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1117 ibm spectrum protect plus: mehrere schwachstellen bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-1118","cve":"","title":"Dell PowerProtect Data Domain OS: Mehrere Schwachstellen","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1118","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1118","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T09:01:01.363Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1118","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1118","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1118 dell powerprotect data domain os: mehrere schwachstellen bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-1119","cve":"","title":"X.Org X11, Xwayland: Mehrere Schwachstellen","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1119","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1119","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T09:01:01.363Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1119","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1119","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1119 x.org x11, xwayland: mehrere schwachstellen bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-1120","cve":"","title":"Ivanti Neurons for ITSM: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1120","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1120","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T09:01:01.363Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1120","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1120","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1120 ivanti neurons for itsm: mehrere schwachstellen ermöglichen offenlegung von informationen bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-1121","cve":"","title":"CPython: Schwachstelle ermöglicht Manipulation von Daten","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1121","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1121","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T09:01:01.363Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1121","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1121","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1121 cpython: schwachstelle ermöglicht manipulation von daten bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-1122","cve":"","title":"Fortinet FortiWeb: Schwachstelle ermöglicht Codeausführung","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1122","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1122","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T09:01:01.363Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1122","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1122","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1122 fortinet fortiweb: schwachstelle ermöglicht codeausführung bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-1123","cve":"","title":"Apache Airflow: Schwachstelle ermöglicht Codeausführung","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1123","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1123","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T09:01:01.363Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1123","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1123","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1123 apache airflow: schwachstelle ermöglicht codeausführung bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-1124","cve":"","title":"Froxlor: Mehrere Schwachstellen","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1124","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1124","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T09:01:01.363Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1124","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1124","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1124 froxlor: mehrere schwachstellen bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-1125","cve":"","title":"Synology DiskStation Manager: Mehrere Schwachstellen","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1125","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1125","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T09:01:01.363Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1125","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1125","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1125 synology diskstation manager: mehrere schwachstellen bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-1126","cve":"","title":"ImageMagick: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1126","severity":"low","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1126","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T09:01:01.363Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1126","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1126","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"low","search_text":"bsi:wid-sec-2026-1126 imagemagick: mehrere schwachstellen ermöglichen denial of service bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-1127","cve":"","title":"IBM App Connect Enterprise Certified Container (axios): Schwachstelle ermöglicht Denial of Service","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1127","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1127","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T09:01:01.363Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1127","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1127","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1127 ibm app connect enterprise certified container (axios): schwachstelle ermöglicht denial of service bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2026-1128","cve":"","title":"Composer: Mehrere Schwachstellen ermöglichen Codeausführung","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1128","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1128","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T09:01:01.363Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1128","added":"2026-04-15T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1128","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1128 composer: mehrere schwachstellen ermöglichen codeausführung bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-W-2026-0798","cve":"CVE-2026-33412","title":"vim: Schwachstelle ermöglicht Codeausführung","date":"2026-03-19","published":"2026-03-19","updated":"2026-04-15","source_published":"2026-03-19","source_updated":"2026-04-15","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://github.com/vim/vim/security/advisories/GHSA-w5jw-f54h-x46c","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0798.json","summary":"WID-SEC-W-2026-0798 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0798","summary":"WID-SEC-2026-0798 - Portal Version","category":"self"},{"url":"https://github.com/vim/vim/security/advisories/GHSA-w5jw-f54h-x46c","summary":"GitHub Security Advisory GHSA-w5jw-f54h-x46c vom 2026-03-19","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6619","summary":"Red Hat Security Advisory RHSA-2026:6619 vom 2026-04-06","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6540","summary":"Red Hat Security Advisory RHSA-2026:6540 vom 2026-04-03","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6539","summary":"Red Hat Security Advisory RHSA-2026:6539 vom 2026-04-03","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6502","summary":"Red Hat Security Advisory RHSA-2026:6502 vom 2026-04-02","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6617","summary":"Red Hat Security Advisory RHSA-2026:6617 vom 2026-04-06","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6725","summary":"Red Hat Security Advisory RHSA-2026:6725 vom 2026-04-07","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6730","summary":"Red Hat Security Advisory RHSA-2026:6730 vom 2026-04-07","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6729","summary":"Red Hat Security Advisory RHSA-2026:6729 vom 2026-04-07","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6736","summary":"Red Hat Security Advisory RHSA-2026:6736 vom 2026-04-07","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6620","summary":"Red Hat Security Advisory RHSA-2026:6620 vom 2026-04-06","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6731","summary":"Red Hat Security Advisory RHSA-2026:6731 vom 2026-04-07","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6915","summary":"Red Hat Security Advisory RHSA-2026:6915 vom 2026-04-08","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:6915","summary":"Rocky Linux Security Advisory RLSA-2026:6915 vom 2026-04-09","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-6915.html","summary":"Oracle Linux Security Advisory ELSA-2026-6915 vom 2026-04-08","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:7711","summary":"Red Hat Security Advisory RHSA-2026:7711 vom 2026-04-13","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-7711.html","summary":"Oracle Linux Security Advisory ELSA-2026-7711 vom 2026-04-13","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8171-1","summary":"Ubuntu Security Notice USN-8171-1 vom 2026-04-14","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:8259","summary":"Red Hat Security Advisory RHSA-2026:8259 vom 2026-04-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-April/025369.html","summary":"SUSE Security Update SUSE-SU-2026:1347-1 vom 2026-04-15","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:7711","summary":"Rocky Linux Security Advisory RLSA-2026:7711 vom 2026-04-15","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-8259.html","summary":"Oracle Linux Security Advisory ELSA-2026-8259 vom 2026-04-15","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:7239","summary":"Red Hat Security Advisory RHSA-2026:7239 vom 2026-04-16","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://github.com/vim/vim/security/advisories/GHSA-w5jw-f54h-x46c","published":"2026-03-19","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T10:54:05.374Z","sourceUrl":"https://github.com/vim/vim/security/advisories/GHSA-w5jw-f54h-x46c","added":"2026-04-15T00:00:00.000Z","public_url":"https://github.com/vim/vim/security/advisories/GHSA-w5jw-f54h-x46c","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-w-2026-0798 cve-2026-33412 vim: schwachstelle ermöglicht codeausführung bsi bsi","public_published":"2026-03-19","public_updated":"2026-04-15","public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-W-2026-0863","cve":"CVE-2026-1519","title":"Internet Systems Consortium BIND: Mehrere Schwachstellen","date":"2026-03-25","published":"2026-03-25","updated":"2026-04-15","source_published":"2026-03-25","source_updated":"2026-04-15","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://downloads.isc.org/isc/bind9/9.18.47/doc/arm/html/notes.html#security-fixes","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0863.json","summary":"WID-SEC-W-2026-0863 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0863","summary":"WID-SEC-2026-0863 - Portal Version","category":"self"},{"url":"https://downloads.isc.org/isc/bind9/9.18.47/doc/arm/html/notes.html#security-fixes","summary":"ISC BIND 9.18.47 vom 2026-03-25","category":"external"},{"url":"https://downloads.isc.org/isc/bind9/9.20.21/doc/arm/html/notes.html#security-fixes","summary":"ISC BIND 9.20.21 vom 2026-03-25","category":"external"},{"url":"https://downloads.isc.org/isc/bind9/9.21.20/doc/arm/html/notes.html#security-fixes","summary":"ISC BIND 9.21.20 vom 2026-03-25","category":"external"},{"url":"https://kb.isc.org/docs/cve-2026-1519","summary":"ISC Security Advisory CVE-2026-1519 vom 2026-03-25","category":"external"},{"url":"https://kb.isc.org/docs/cve-2026-3104","summary":"ISC Security Advisory CVE-2026-3104 vom 2026-03-25","category":"external"},{"url":"https://kb.isc.org/docs/cve-2026-3119","summary":"ISC Security Advisory CVE-2026-3119 vom 2026-03-25","category":"external"},{"url":"https://kb.isc.org/docs/cve-2026-3591","summary":"ISC Security Advisory CVE-2026-3591 vom 2026-03-25","category":"external"},{"url":"https://www.isc.org/download/#BIND","summary":"ISC Security Advisory vom 2026-03-25","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8124-1","summary":"Ubuntu Security Notice USN-8124-1 vom 2026-03-25","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-2026-8db2f80244","summary":"Fedora Security Advisory FEDORA-2026-8DB2F80244 vom 2026-03-25","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-2026-a6efefa854","summary":"Fedora Security Advisory FEDORA-2026-A6EFEFA854 vom 2026-03-25","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-2026-bcc66a29da","summary":"Fedora Security Advisory FEDORA-2026-BCC66A29DA vom 2026-03-25","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-2026-01c20fe8ca","summary":"Fedora Security Advisory FEDORA-2026-01C20FE8CA vom 2026-03-25","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-2026-b2ec0d8a47","summary":"Fedora Security Advisory FEDORA-2026-B2EC0D8A47 vom 2026-03-26","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-2026-19d899e92d","summary":"Fedora Security Advisory FEDORA-2026-19D899E92D vom 2026-03-26","category":"external"},{"url":"https://lists.debian.org/debian-security-announce/2026/msg00090.html","summary":"Debian Security Advisory DSA-6181 vom 2026-03-28","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WHDDDSYMDWFVF6O6R7Q33MRSQLKSJIPB/","summary":"openSUSE Security Update OPENSUSE-SU-2026:10448-1 vom 2026-03-31","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2-2026-3226.html","summary":"Amazon Linux Security Advisory ALAS2-2026-3226 vom 2026-04-01","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-April/025154.html","summary":"SUSE Security Update SUSE-SU-2026:1209-1 vom 2026-04-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-April/025189.html","summary":"SUSE Security Update SUSE-SU-2026:1229-1 vom 2026-04-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-April/025188.html","summary":"SUSE Security Update SUSE-SU-2026:1230-1 vom 2026-04-09","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2026/04/msg00008.html","summary":"Debian Security Advisory DLA-4529 vom 2026-04-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:7915","summary":"Red Hat Security Advisory RHSA-2026:7915 vom 2026-04-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:8155","summary":"Red Hat Security Advisory RHSA-2026:8155 vom 2026-04-14","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-8075.html","summary":"Oracle Linux Security Advisory ELSA-2026-8075 vom 2026-04-15","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:8075","summary":"Red Hat Security Advisory RHSA-2026:8075 vom 2026-04-14","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-7915.html","summary":"Oracle Linux Security Advisory ELSA-2026-7915 vom 2026-04-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-April/025325.html","summary":"SUSE Security Update SUSE-SU-2026:1312-1 vom 2026-04-14","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-8155.html","summary":"Oracle Linux Security Advisory ELSA-2026-8155 vom 2026-04-15","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:8312","summary":"Red Hat Security Advisory RHSA-2026:8312 vom 2026-04-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-April/025366.html","summary":"SUSE Security Update SUSE-SU-2026:1351-1 vom 2026-04-15","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:8075","summary":"Rocky Linux Security Advisory RLSA-2026:8075 vom 2026-04-15","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:7915","summary":"Rocky Linux Security Advisory RLSA-2026:7915 vom 2026-04-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-April/025354.html","summary":"SUSE Security Update SUSE-SU-2026:1366-1 vom 2026-04-15","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:8352","summary":"Red Hat Security Advisory RHSA-2026:8352 vom 2026-04-16","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:8155","summary":"Rocky Linux Security Advisory RLSA-2026:8155 vom 2026-04-15","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-8352.html","summary":"Oracle Linux Security Advisory ELSA-2026-8352 vom 2026-04-16","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://downloads.isc.org/isc/bind9/9.18.47/doc/arm/html/notes.html#security-fixes","published":"2026-03-25","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T10:54:05.374Z","sourceUrl":"https://downloads.isc.org/isc/bind9/9.18.47/doc/arm/html/notes.html#security-fixes","added":"2026-04-15T00:00:00.000Z","public_url":"https://downloads.isc.org/isc/bind9/9.18.47/doc/arm/html/notes.html#security-fixes","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-w-2026-0863 cve-2026-1519 internet systems consortium bind: mehrere schwachstellen bsi bsi","public_published":"2026-03-25","public_updated":"2026-04-15","public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-W-2026-0915","cve":"CVE-2013-0248","title":"Kyocera Drucker: Mehrere Schwachstellen","date":"2026-03-30","published":"2026-03-30","updated":"2026-04-15","source_published":"2026-03-30","source_updated":"2026-04-15","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://www.kyoceradocumentsolutions.de/de/support/sicherheitsluecken.html","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0915.json","summary":"WID-SEC-W-2026-0915 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0915","summary":"WID-SEC-2026-0915 - Portal Version","category":"self"},{"url":"https://www.kyoceradocumentsolutions.de/de/support/sicherheitsluecken.html","summary":"Kyocera-Sicherheitshinweise","category":"external"},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-0248","summary":"National Vulnerability Database CVE-2013-0248","category":"external"},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-0050","summary":"National Vulnerability Database CVE-2014-0050","category":"external"},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8126","summary":"National Vulnerability Database CVE-2015-8126","category":"external"},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8472","summary":"National Vulnerability Database CVE-2015-8472","category":"external"},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1000031","summary":"National Vulnerability Database CVE-2016-1000031","category":"external"},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3092","summary":"National Vulnerability Database CVE-2016-3092","category":"external"},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3751","summary":"National Vulnerability Database CVE-2016-3751","category":"external"},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-9842","summary":"National Vulnerability Database CVE-2016-9842","category":"external"},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-12652","summary":"National Vulnerability Database CVE-2017-12652","category":"external"},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-37434","summary":"National Vulnerability Database CVE-2022-37434","category":"external"},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-40303","summary":"National Vulnerability Database CVE-2022-40303","category":"external"},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-40304","summary":"National Vulnerability Database CVE-2022-40304","category":"external"},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-24998","summary":"National Vulnerability Database CVE-2023-24998","category":"external"},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-29469","summary":"National Vulnerability Database CVE-2023-29469","category":"external"},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-20952","summary":"National Vulnerability Database CVE-2024-20952","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://www.kyoceradocumentsolutions.de/de/support/sicherheitsluecken.html","published":"2026-03-30","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T09:01:01.363Z","sourceUrl":"https://www.kyoceradocumentsolutions.de/de/support/sicherheitsluecken.html","added":"2026-04-15T00:00:00.000Z","public_url":"https://www.kyoceradocumentsolutions.de/de/support/sicherheitsluecken.html","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-w-2026-0915 cve-2013-0248 kyocera drucker: mehrere schwachstellen bsi bsi","public_published":"2026-03-30","public_updated":"2026-04-15","public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-W-2026-0931","cve":"CVE-2026-33026","title":"nginx-ui: Mehrere Schwachstellen","date":"2026-03-30","published":"2026-03-30","updated":"2026-04-15","source_published":"2026-03-30","source_updated":"2026-04-15","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://github.com/0xJacky/nginx-ui/releases/tag/v2.3.4","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0931.json","summary":"WID-SEC-W-2026-0931 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0931","summary":"WID-SEC-2026-0931 - Portal Version","category":"self"},{"url":"https://github.com/0xJacky/nginx-ui/releases/tag/v2.3.4","summary":"NGINX-UI Release Notes vom 2026-03-30","category":"external"},{"url":"https://euvd.enisa.europa.eu/enisa/EUVD-2026-17151","summary":"EU Vulnerability Database vom 2026-03-30","category":"external"},{"url":"https://euvd.enisa.europa.eu/enisa/EUVD-2026-17152","summary":"EU Vulnerability Database vom 2026-03-30","category":"external"},{"url":"https://euvd.enisa.europa.eu/enisa/EUVD-2026-17154","summary":"EU Vulnerability Database vom 2026-03-30","category":"external"},{"url":"https://euvd.enisa.europa.eu/enisa/EUVD-2026-17156","summary":"EU Vulnerability Database vom 2026-03-30","category":"external"},{"url":"https://euvd.enisa.europa.eu/enisa/EUVD-2026-17158","summary":"EU Vulnerability Database vom 2026-03-30","category":"external"},{"url":"https://euvd.enisa.europa.eu/enisa/EUVD-2026-17194","summary":"EU Vulnerability Database vom 2026-03-30","category":"external"},{"url":"https://github.com/advisories/GHSA-5hf2-vhj6-gj9m","summary":"GitHub Security Advisory GHSA-5hf2-vhj6-gj9m vom 2026-03-30","category":"external"},{"url":"https://github.com/advisories/GHSA-cp8r-8jvw-v3qg","summary":"GitHub Security Advisory GHSA-cp8r-8jvw-v3qg vom 2026-03-30","category":"external"},{"url":"https://github.com/advisories/GHSA-fhh2-gg7w-gwpq","summary":"GitHub Security Advisory GHSA-fhh2-gg7w-gwpq vom 2026-03-30","category":"external"},{"url":"https://github.com/advisories/GHSA-h6c2-x2m2-mwhf","summary":"GitHub Security Advisory GHSA-h6c2-x2m2-mwhf vom 2026-03-30","category":"external"},{"url":"https://github.com/advisories/GHSA-m468-xcm6-fxg4","summary":"GitHub Security Advisory GHSA-m468-xcm6-fxg4 vom 2026-03-30","category":"external"},{"url":"https://github.com/advisories/GHSA-m8p8-53vf-8357","summary":"GitHub Security Advisory GHSA-m8p8-53vf-8357 vom 2026-03-30","category":"external"},{"url":"https://pluto.security/blog/mcp-bug-nginx-security-vulnerability-cvss-9-8/","summary":"Exploit CVE-2026-33032 vom 2026-04-15","category":"external"}],"severity":"critical","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://github.com/0xJacky/nginx-ui/releases/tag/v2.3.4","published":"2026-03-30","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":"2026-03-30","source_doc_updated":"2026-04-15","cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T13:31:22.415Z","sourceUrl":"https://github.com/0xJacky/nginx-ui/releases/tag/v2.3.4","added":"2026-04-15T00:00:00.000Z","public_url":"https://github.com/0xJacky/nginx-ui/releases/tag/v2.3.4","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"critical","search_text":"bsi:wid-sec-w-2026-0931 cve-2026-33026 nginx-ui: mehrere schwachstellen bsi bsi","public_published":"2026-03-30","public_updated":"2026-04-15","public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-W-2026-0991","cve":"CVE-2026-33227","title":"Apache ActiveMQ, Client, Broker und Web: Mehrere Schwachstellen","date":"2026-04-07","published":"2026-04-07","updated":"2026-04-15","source_published":"2026-04-07","source_updated":"2026-04-15","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://activemq.apache.org/security-advisories.data/CVE-2026-33227-announcement.txt","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0991.json","summary":"WID-SEC-W-2026-0991 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0991","summary":"WID-SEC-2026-0991 - Portal Version","category":"self"},{"url":"https://activemq.apache.org/security-advisories.data/CVE-2026-33227-announcement.txt","summary":"ActiveMQ CVE-2026-33227 announcement vom 2026-04-07","category":"external"},{"url":"https://activemq.apache.org/security-advisories.data/CVE-2026-34197-announcement.txt","summary":"ActiveMQ CVE-2026-34197 announcement vom 2026-04-07","category":"external"},{"url":"https://github.com/dinosn/CVE-2026-34197/blob/main/exploit_poc.py","summary":"PoC CVE-2026-34197","category":"external"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-34197","summary":"CVE Record CVE-2026-34197 vom 2026-04-16","category":"external"}],"severity":"high","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://activemq.apache.org/security-advisories.data/CVE-2026-33227-announcement.txt","published":"2026-04-07","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T09:01:01.363Z","sourceUrl":"https://activemq.apache.org/security-advisories.data/CVE-2026-33227-announcement.txt","added":"2026-04-15T00:00:00.000Z","public_url":"https://activemq.apache.org/security-advisories.data/CVE-2026-33227-announcement.txt","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-w-2026-0991 cve-2026-33227 apache activemq, client, broker und web: mehrere schwachstellen bsi bsi","public_published":"2026-04-07","public_updated":"2026-04-15","public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-W-2026-1134","cve":"CVE-2025-14688","title":"IBM DB2: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":"2026-04-15","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://www.ibm.com/support/pages/node/7267642","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1134.json","summary":"WID-SEC-W-2026-1134 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1134","summary":"WID-SEC-2026-1134 - Portal Version","category":"self"},{"url":"https://www.ibm.com/support/pages/node/7267642","summary":"IBM Security Bulletin 7267642 vom 2026-04-15","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7269424","summary":"IBM Security Bulletin 7269424 vom 2026-04-15","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7269433","summary":"IBM Security Bulletin 7269433 vom 2026-04-15","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7269434","summary":"IBM Security Bulletin 7269434 vom 2026-04-15","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7269435","summary":"IBM Security Bulletin 7269435 vom 2026-04-15","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://www.ibm.com/support/pages/node/7267642","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T10:54:05.374Z","sourceUrl":"https://www.ibm.com/support/pages/node/7267642","added":"2026-04-15T00:00:00.000Z","public_url":"https://www.ibm.com/support/pages/node/7267642","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-w-2026-1134 cve-2025-14688 ibm db2: mehrere schwachstellen ermöglichen denial of service bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-W-2026-1135","cve":"","title":"Budibase: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":"2026-04-15","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://github.com/Budibase/budibase/security/advisories/GHSA-8783-3wgf-jggf","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1135.json","summary":"WID-SEC-W-2026-1135 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1135","summary":"WID-SEC-2026-1135 - Portal Version","category":"self"},{"url":"https://github.com/Budibase/budibase/security/advisories/GHSA-8783-3wgf-jggf","summary":"GitHub Security Advisory GHSA-8783-3wgf-jggf vom 2026-04-15","category":"external"}],"severity":"high","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://github.com/Budibase/budibase/security/advisories/GHSA-8783-3wgf-jggf","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T10:54:05.374Z","sourceUrl":"https://github.com/Budibase/budibase/security/advisories/GHSA-8783-3wgf-jggf","added":"2026-04-15T00:00:00.000Z","public_url":"https://github.com/Budibase/budibase/security/advisories/GHSA-8783-3wgf-jggf","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-w-2026-1135 budibase: schwachstelle ermöglicht umgehen von sicherheitsvorkehrungen bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-W-2026-1136","cve":"CVE-2026-33186","title":"Red Hat OpenShift Container Platform (gRPC-Go): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":"2026-04-15","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://access.redhat.com/errata/RHSA-2026:7245","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1136.json","summary":"WID-SEC-W-2026-1136 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1136","summary":"WID-SEC-2026-1136 - Portal Version","category":"self"},{"url":"https://access.redhat.com/errata/RHSA-2026:7245","summary":"RedHat Security Advisory vom 2026-04-15","category":"external"}],"severity":"high","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://access.redhat.com/errata/RHSA-2026:7245","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T10:54:05.374Z","sourceUrl":"https://access.redhat.com/errata/RHSA-2026:7245","added":"2026-04-15T00:00:00.000Z","public_url":"https://access.redhat.com/errata/RHSA-2026:7245","public_source":"Red Hat","public_source_slug":"red-hat","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-w-2026-1136 cve-2026-33186 red hat openshift container platform (grpc-go): schwachstelle ermöglicht umgehen von sicherheitsvorkehrungen red hat bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-W-2026-1154","cve":"","title":"Mattermost: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":"2026-04-15","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://mattermost.com/security-updates/#plugins","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1154.json","summary":"WID-SEC-W-2026-1154 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1154","summary":"WID-SEC-2026-1154 - Portal Version","category":"self"},{"url":"https://mattermost.com/security-updates/#plugins","summary":"Mattermost Security Updates vom 2026-04-15","category":"external"},{"url":"https://mattermost.com/security-updates/#server","summary":"Mattermost Security Updates vom 2026-04-15","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://mattermost.com/security-updates/#plugins","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":"2026-04-15","source_doc_updated":"2026-04-15","cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T13:31:22.415Z","sourceUrl":"https://mattermost.com/security-updates/#plugins","added":"2026-04-15T00:00:00.000Z","public_url":"https://mattermost.com/security-updates/#plugins","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-w-2026-1154 mattermost: mehrere schwachstellen ermöglichen nicht spezifizierten angriff bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-W-2026-1155","cve":"","title":"Microsoft Defender: Schwachstelle ermöglicht Privilegieneskalation","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":"2026-04-15","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://github.com/Nightmare-Eclipse/RedSun","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1155.json","summary":"WID-SEC-W-2026-1155 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1155","summary":"WID-SEC-2026-1155 - Portal Version","category":"self"},{"url":"https://github.com/Nightmare-Eclipse/RedSun","summary":"Red Sun PoC vom 2026-04-16","category":"external"},{"url":"https://infosec.exchange/@wdormann/116412019416916182","summary":"Will Dormann vom 2026-04-16","category":"external"}],"severity":"high","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://github.com/Nightmare-Eclipse/RedSun","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":"2026-04-15","source_doc_updated":"2026-04-15","cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T13:31:22.415Z","sourceUrl":"https://github.com/Nightmare-Eclipse/RedSun","added":"2026-04-15T00:00:00.000Z","public_url":"https://github.com/Nightmare-Eclipse/RedSun","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-w-2026-1155 microsoft defender: schwachstelle ermöglicht privilegieneskalation bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-W-2026-1156","cve":"CVE-2026-41035","title":"Rsync: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":"2026-04-15","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://github.com/advisories/GHSA-M34R-4V3R-PP9V","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1156.json","summary":"WID-SEC-W-2026-1156 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1156","summary":"WID-SEC-2026-1156 - Portal Version","category":"self"},{"url":"https://github.com/advisories/GHSA-M34R-4V3R-PP9V","summary":"GitHub Advisory Database vom 2026-04-15","category":"external"},{"url":"https://www.openwall.com/lists/oss-security/2026/04/16/2","summary":"OSS Security Mailing List vom 2026-04-15","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://github.com/advisories/GHSA-M34R-4V3R-PP9V","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":"2026-04-15","source_doc_updated":"2026-04-15","cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T13:31:22.415Z","sourceUrl":"https://github.com/advisories/GHSA-M34R-4V3R-PP9V","added":"2026-04-15T00:00:00.000Z","public_url":"https://github.com/advisories/GHSA-M34R-4V3R-PP9V","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-w-2026-1156 cve-2026-41035 rsync: schwachstelle ermöglicht umgehen von sicherheitsvorkehrungen bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-W-2026-1157","cve":"CVE-2025-62718","title":"IBM App Connect Enterprise: Mehrere Schwachstellen","date":"2026-04-15","published":"2026-04-15","updated":null,"source_published":"2026-04-15","source_updated":"2026-04-15","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://www.ibm.com/support/pages/node/7269710","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1157.json","summary":"WID-SEC-W-2026-1157 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1157","summary":"WID-SEC-2026-1157 - Portal Version","category":"self"},{"url":"https://www.ibm.com/support/pages/node/7269710","summary":"IBM Security Bulletin 7269710 vom 2026-04-15","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7269713","summary":"IBM Security Bulletin 7269713 vom 2026-04-15","category":"external"}],"severity":"high","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://www.ibm.com/support/pages/node/7269710","published":"2026-04-15","updated":"2026-04-15","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":"2026-04-15","source_doc_updated":"2026-04-15","cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T13:31:22.415Z","sourceUrl":"https://www.ibm.com/support/pages/node/7269710","added":"2026-04-15T00:00:00.000Z","public_url":"https://www.ibm.com/support/pages/node/7269710","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-w-2026-1157 cve-2025-62718 ibm app connect enterprise: mehrere schwachstellen bsi bsi","public_published":"2026-04-15","public_updated":null,"public_display_date":"2026-04-15","public_sort_date":"2026-04-15","public_period_date":"2026-04-15"},{"id":"BSI:WID-SEC-2023-2890","cve":"","title":"Microsoft Windows: Mehrere Schwachstellen","date":"2026-04-14","published":"2026-04-14","updated":null,"source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2890","severity":"critical","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2890","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-14T09:00:56.117Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2890","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2890","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"critical","search_text":"bsi:wid-sec-2023-2890 microsoft windows: mehrere schwachstellen bsi bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"BSI:WID-SEC-2024-1451","cve":"","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-04-14","published":"2026-04-14","updated":null,"source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1451","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1451","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-15T06:26:45.891Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1451","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1451","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2024-1451 linux kernel: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2024-1721","cve":"","title":"Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff","date":"2026-04-14","published":"2026-04-14","updated":null,"source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1721","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1721","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-15T06:26:45.891Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1721","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1721","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2024-1721 linux kernel: mehrere schwachstellen ermöglichen nicht spezifizierten angriff bsi bsi"},{"id":"BSI:WID-SEC-2024-3050","cve":"","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-04-14","published":"2026-04-14","updated":null,"source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3050","severity":"low","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3050","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-15T06:26:45.891Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3050","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3050","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14","severity_norm":"low","vendor_slug":null,"search_text":"bsi:wid-sec-2024-3050 linux kernel: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2024-3066","cve":"","title":"Redis: Mehrere Schwachstellen","date":"2026-04-14","published":"2026-04-14","updated":null,"source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3066","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3066","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T06:26:45.891Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3066","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3066","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2024-3066 redis: mehrere schwachstellen bsi bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"BSI:WID-SEC-2024-3134","cve":"","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-04-14","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3134","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-15T06:26:45.891Z","published":"2026-04-14","source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3134","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3134","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3134","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2024-3134 linux kernel: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2024-3251","cve":"","title":"Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-04-14","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3251","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-15T06:26:45.891Z","published":"2026-04-14","source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3251","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3251","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3251","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2024-3251 linux kernel: mehrere schwachstellen ermöglichen denial of service bsi bsi"},{"id":"BSI:WID-SEC-2024-3575","cve":"","title":"Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-04-14","published":"2026-04-14","updated":null,"source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3575","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3575","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-15T06:26:45.891Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3575","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3575","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2024-3575 linux kernel: mehrere schwachstellen ermöglichen denial of service bsi bsi"},{"id":"BSI:WID-SEC-2024-3762","cve":"","title":"Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-04-14","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3762","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-15T06:26:45.891Z","published":"2026-04-14","source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3762","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3762","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3762","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2024-3762 linux kernel: mehrere schwachstellen ermöglichen denial of service bsi bsi"},{"id":"BSI:WID-SEC-2025-0453","cve":"","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-04-14","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0453","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-15T06:26:45.891Z","published":"2026-04-14","source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0453","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0453","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0453","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2025-0453 linux kernel: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2025-1673","cve":"","title":"Red Hat Enterprise Linux (libtpms): Schwachstelle ermöglicht Denial of Service","date":"2026-04-14","published":"2026-04-14","updated":null,"source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1673","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1673","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-14T12:00:54.101Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1673","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1673","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2025-1673 red hat enterprise linux (libtpms): schwachstelle ermöglicht denial of service bsi bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"BSI:WID-SEC-2025-1869","cve":"","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-04-14","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1869","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-14T18:01:34.363Z","published":"2026-04-14","source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1869","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1869","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1869","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2025-1869 linux kernel: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2025-2107","cve":"","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-04-14","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2107","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-14T18:01:34.363Z","published":"2026-04-14","source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2107","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2107","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2107","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2107 linux kernel: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2025-2170","cve":"","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-04-14","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2170","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-14T22:16:17.049Z","published":"2026-04-14","source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2170","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2170","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2170","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2170 linux kernel: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2025-2194","cve":"","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-04-14","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2194","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-14T22:16:17.049Z","published":"2026-04-14","source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2194","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2194","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2194","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2194 linux kernel: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2025-2196","cve":"","title":"Redis: Mehrere Schwachstellen","date":"2026-04-14","published":"2026-04-14","updated":null,"source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2196","severity":"critical","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2196","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-14T22:16:17.049Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2196","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2196","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"critical","search_text":"bsi:wid-sec-2025-2196 redis: mehrere schwachstellen bsi bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"BSI:WID-SEC-2025-2246","cve":"","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-04-14","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2246","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-14T22:16:17.049Z","published":"2026-04-14","source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2246","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2246","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2246","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2246 linux kernel: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2025-2340","cve":"","title":"Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-04-14","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2340","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-14T22:16:17.049Z","published":"2026-04-14","source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2340","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2340","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2340","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2340 linux kernel: mehrere schwachstellen ermöglichen denial of service bsi bsi"},{"id":"BSI:WID-SEC-2025-2350","cve":"","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-04-14","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2350","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-14T22:16:17.049Z","published":"2026-04-14","source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2350","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2350","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2350","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2350 linux kernel: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2025-2430","cve":"","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-04-14","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2430","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-14T22:16:17.049Z","published":"2026-04-14","source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2430","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2430","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2430","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2430 linux kernel: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2025-2431","cve":"","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-04-14","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2431","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-14T22:16:17.049Z","published":"2026-04-14","source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2431","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2431","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2431","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2431 linux kernel: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2025-2441","cve":"","title":"Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-04-14","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2441","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-15T06:26:45.891Z","published":"2026-04-14","source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2441","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2441","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2441","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2441 linux kernel: mehrere schwachstellen ermöglichen denial of service bsi bsi"},{"id":"BSI:WID-SEC-2025-2450","cve":"","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-04-14","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2450","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-15T06:26:45.891Z","published":"2026-04-14","source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2450","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2450","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2450","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2450 linux kernel: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2025-2531","cve":"","title":"Linux Kernel: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen","date":"2026-04-14","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2531","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-15T06:26:45.891Z","published":"2026-04-14","source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2531","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2531","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2531","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2531 linux kernel: mehrere schwachstellen ermöglichen umgehen von sicherheitsvorkehrungen bsi bsi"},{"id":"BSI:WID-SEC-2025-2595","cve":"","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-04-14","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2595","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-15T06:26:45.891Z","published":"2026-04-14","source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2595","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2595","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2595","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2595 linux kernel: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2025-2658","cve":"","title":"Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-04-14","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2658","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-15T06:26:45.891Z","published":"2026-04-14","source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2658","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2658","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2658","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2658 linux kernel: mehrere schwachstellen ermöglichen denial of service bsi bsi"},{"id":"BSI:WID-SEC-2025-2747","cve":"","title":"Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-04-14","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2747","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-15T06:26:45.891Z","published":"2026-04-14","source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2747","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2747","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2747","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2747 linux kernel: mehrere schwachstellen ermöglichen denial of service bsi bsi"},{"id":"BSI:WID-SEC-2025-2756","cve":"","title":"Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-04-14","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2756","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-15T06:26:45.891Z","published":"2026-04-14","source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2756","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2756","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2756","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2756 linux kernel: mehrere schwachstellen ermöglichen denial of service bsi bsi"},{"id":"BSI:WID-SEC-2026-0791","cve":"","title":"Python: Schwachstelle ermöglicht Path Traversal","date":"2026-04-14","published":"2026-04-14","updated":null,"source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0791","severity":"low","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0791","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-15T06:26:45.891Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0791","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0791","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14","severity_norm":"low","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0791 python: schwachstelle ermöglicht path traversal bsi bsi"},{"id":"BSI:WID-SEC-2026-0818","cve":"","title":"etcd: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen","date":"2026-04-14","published":"2026-04-14","updated":null,"source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0818","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0818","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-15T06:26:45.891Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0818","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0818","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0818 etcd: mehrere schwachstellen ermöglichen umgehen von sicherheitsvorkehrungen bsi bsi"},{"id":"BSI:WID-SEC-2026-0870","cve":"","title":"libpng: Mehrere Schwachstellen","date":"2026-04-14","published":"2026-04-14","updated":null,"source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0870","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0870","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-15T06:26:45.891Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0870","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0870","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0870 libpng: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0945","cve":"","title":"gdk-pixbuf: Schwachstelle ermöglicht Denial of Service und potenzielle Codeausführung","date":"2026-04-14","published":"2026-04-14","updated":null,"source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0945","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0945","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-15T06:26:45.891Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0945","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0945","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0945 gdk-pixbuf: schwachstelle ermöglicht denial of service und potenzielle codeausführung bsi bsi"},{"id":"BSI:WID-SEC-2026-0950","cve":"","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-04-14","published":"2026-04-14","updated":null,"source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0950","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0950","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-15T06:26:45.891Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0950","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0950","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0950 linux kernel: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-1054","cve":"","title":"Apache log4net: Schwachstelle ermöglicht Manipulation von Dateien","date":"2026-04-14","published":"2026-04-14","updated":null,"source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1054","severity":"low","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1054","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T06:26:45.891Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1054","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1054","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"low","search_text":"bsi:wid-sec-2026-1054 apache log4net: schwachstelle ermöglicht manipulation von dateien bsi bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"BSI:WID-SEC-2026-1062","cve":"","title":"Microsoft Edge: Mehrere Schwachstellen","date":"2026-04-14","published":"2026-04-14","updated":null,"source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1062","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1062","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T06:26:45.891Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1062","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1062","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1062 microsoft edge: mehrere schwachstellen bsi bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"BSI:WID-SEC-2026-1064","cve":"","title":"CPython: Mehrere Schwachstellen","date":"2026-04-14","published":"2026-04-14","updated":null,"source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1064","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1064","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T06:26:45.891Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1064","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1064","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1064 cpython: mehrere schwachstellen bsi bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"BSI:WID-SEC-2026-1068","cve":"","title":"Adobe Acrobat und Acrobat Reader: Mehrere Schwachstellen","date":"2026-04-14","published":"2026-04-14","updated":null,"source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1068","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1068","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-14T09:00:56.117Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1068","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1068","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1068 adobe acrobat und acrobat reader: mehrere schwachstellen bsi bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"BSI:WID-SEC-2026-1073","cve":"","title":"Apache Airflow: Mehrere Schwachstellen","date":"2026-04-14","published":"2026-04-14","updated":null,"source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1073","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1073","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T06:26:45.891Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1073","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1073","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1073 apache airflow: mehrere schwachstellen bsi bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"BSI:WID-SEC-2026-1080","cve":"","title":"OpenJPEG: Schwachstelle ermöglicht Denial of Service","date":"2026-04-14","published":"2026-04-14","updated":null,"source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1080","severity":"low","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1080","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T06:26:45.891Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1080","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1080","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"low","search_text":"bsi:wid-sec-2026-1080 openjpeg: schwachstelle ermöglicht denial of service bsi bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"BSI:WID-SEC-2026-1081","cve":"","title":"MinIO: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen","date":"2026-04-14","published":"2026-04-14","updated":null,"source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1081","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1081","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T06:26:45.891Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1081","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1081","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1081 minio: mehrere schwachstellen ermöglichen umgehen von sicherheitsvorkehrungen bsi bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"BSI:WID-SEC-2026-1082","cve":"","title":"Eclipse Jetty: Schwachstelle ermöglicht Manipulation von Daten","date":"2026-04-14","published":"2026-04-14","updated":null,"source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1082","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1082","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T06:26:45.891Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1082","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1082","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1082 eclipse jetty: schwachstelle ermöglicht manipulation von daten bsi bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"BSI:WID-SEC-2026-1083","cve":"","title":"QEMU: Schwachstelle ermöglicht Manipulation, Offenlegung und DoS","date":"2026-04-14","published":"2026-04-14","updated":null,"source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1083","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1083","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T06:26:45.891Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1083","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1083","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1083 qemu: schwachstelle ermöglicht manipulation, offenlegung und dos bsi bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"BSI:WID-SEC-2026-1084","cve":"","title":"BigBlueButton: Mehrere Schwachstellen","date":"2026-04-14","published":"2026-04-14","updated":null,"source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1084","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1084","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T06:26:45.891Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1084","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1084","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1084 bigbluebutton: mehrere schwachstellen bsi bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"BSI:WID-SEC-2026-1085","cve":"","title":"ESRI ArcGIS: Mehrere Schwachstellen","date":"2026-04-14","published":"2026-04-14","updated":null,"source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1085","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1085","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T06:26:45.891Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1085","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1085","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1085 esri arcgis: mehrere schwachstellen bsi bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"BSI:WID-SEC-2026-1086","cve":"","title":"ABB 800xA CI868 (für AC 800M) und PM877 (Symphony Plus MR): Schwachstelle ermöglicht Denial of Service","date":"2026-04-14","published":"2026-04-14","updated":null,"source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1086","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1086","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T06:26:45.891Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1086","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1086","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1086 abb 800xa ci868 (für ac 800m) und pm877 (symphony plus mr): schwachstelle ermöglicht denial of service bsi bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"BSI:WID-SEC-2026-1087","cve":"","title":"CPython: Mehrere Schwachstellen","date":"2026-04-14","published":"2026-04-14","updated":null,"source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1087","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1087","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T06:26:45.891Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1087","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1087","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1087 cpython: mehrere schwachstellen bsi bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"BSI:WID-SEC-2026-1088","cve":"","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-04-14","published":"2026-04-14","updated":null,"source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1088","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1088","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T06:26:45.891Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1088","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1088","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1088 linux kernel: mehrere schwachstellen bsi bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"BSI:WID-SEC-2026-1089","cve":"","title":"xwiki: Mehrere Schwachstellen","date":"2026-04-14","published":"2026-04-14","updated":null,"source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1089","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1089","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T06:26:45.891Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1089","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1089","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1089 xwiki: mehrere schwachstellen bsi bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"BSI:WID-SEC-2026-1090","cve":"","title":"Siemens Industrial Edge Management: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen","date":"2026-04-14","published":"2026-04-14","updated":null,"source_published":"2026-04-14","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1090","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1090","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T06:26:45.891Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1090","added":"2026-04-14T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1090","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1090 siemens industrial edge management: schwachstelle ermöglicht umgehen von sicherheitsvorkehrungen bsi bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"BSI:WID-SEC-W-2026-0480","cve":"CVE-2026-0994","title":"Red Hat Enterprise Linux (Python Protobuf): Schwachstelle ermöglicht Denial of Service","date":"2026-02-23","published":"2026-02-23","updated":"2026-04-14","source_published":"2026-02-23","source_updated":"2026-04-14","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://access.redhat.com/errata/RHSA-2026:3094","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0480.json","summary":"WID-SEC-W-2026-0480 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0480","summary":"WID-SEC-2026-0480 - Portal Version","category":"self"},{"url":"https://access.redhat.com/errata/RHSA-2026:3094","summary":"Red Hat Security Advisory vom 2026-02-23","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3095","summary":"Red Hat Security Advisory vom 2026-02-23","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3097","summary":"Red Hat Security Advisory vom 2026-02-23","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3059","summary":"Red Hat Security Advisory vom 2026-02-23","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024376.html","summary":"SUSE Security Update SUSE-SU-2026:0618-1 vom 2026-02-24","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:3094","summary":"Rocky Linux Security Advisory RLSA-2026:3094 vom 2026-02-24","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:3095","summary":"Rocky Linux Security Advisory RLSA-2026:3095 vom 2026-02-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3218","summary":"Red Hat Security Advisory RHSA-2026:3218 vom 2026-02-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3219","summary":"Red Hat Security Advisory RHSA-2026:3219 vom 2026-02-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3220","summary":"Red Hat Security Advisory RHSA-2026:3220 vom 2026-02-24","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8063-1","summary":"Ubuntu Security Notice USN-8063-1 vom 2026-02-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024482.html","summary":"SUSE Security Update SUSE-SU-2026:20490-1 vom 2026-02-27","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3461","summary":"Red Hat Security Advisory RHSA-2026:3461 vom 2026-02-27","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3462","summary":"Red Hat Security Advisory RHSA-2026:3462 vom 2026-02-27","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3958","summary":"Red Hat Security Advisory RHSA-2026:3958 vom 2026-03-06","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3959","summary":"Red Hat Security Advisory RHSA-2026:3959 vom 2026-03-06","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024831.html","summary":"SUSE Security Update SUSE-SU-2026:20753-1 vom 2026-03-24","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ESDDBTLDQY5QYTLM3IG5BFIIAO3I6LFR/","summary":"openSUSE Security Update OPENSUSE-SU-2026:20390-1 vom 2026-03-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-April/025106.html","summary":"SUSE Security Update SUSE-SU-2026:20907-1 vom 2026-04-01","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7269523","summary":"IBM Security Bulletin 7269523 vom 2026-04-15","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://access.redhat.com/errata/RHSA-2026:3094","published":"2026-02-23","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T03:01:11.191Z","sourceUrl":"https://access.redhat.com/errata/RHSA-2026:3094","added":"2026-04-14T00:00:00.000Z","public_url":"https://access.redhat.com/errata/RHSA-2026:3094","public_source":"Red Hat","public_source_slug":"red-hat","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-w-2026-0480 cve-2026-0994 red hat enterprise linux (python protobuf): schwachstelle ermöglicht denial of service red hat bsi","public_published":"2026-02-23","public_updated":"2026-04-14","public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"BSI:WID-SEC-W-2026-0850","cve":"CVE-2025-59375","title":"Mozilla Firefox und Mozilla Thunderbird: Mehrere Schwachstellen","date":"2026-03-24","published":"2026-03-24","updated":"2026-04-14","source_published":"2026-03-24","source_updated":"2026-04-14","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2026-20/","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0850.json","summary":"WID-SEC-W-2026-0850 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0850","summary":"WID-SEC-2026-0850 - Portal Version","category":"self"},{"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2026-20/","summary":"Mozilla Foundation Security Advisory MFSA 2026-20 vom 2026-03-24","category":"external"},{"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2026-21/","summary":"Mozilla Foundation Security Advisory MFSA 2026-21 vom 2026-03-24","category":"external"},{"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2026-22/","summary":"Mozilla Foundation Security Advisory MFSA 2026-22 vom 2026-03-24","category":"external"},{"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2026-23/","summary":"Mozilla Foundation Security Advisory MFSA 2026-23 vom 2026-03-24","category":"external"},{"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2026-24/","summary":"Mozilla Foundation Security Advisory MFSA 2026-24 vom 2026-03-24","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y7M6NU74R4Q7BLCQHUTUH3DFSFTPCPKT/","summary":"openSUSE Security Update OPENSUSE-SU-2026:10413-1 vom 2026-03-25","category":"external"},{"url":"https://lists.debian.org/debian-security-announce/2026/msg00087.html","summary":"Debian Security Advisory DSA-6178 vom 2026-03-25","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5932","summary":"Red Hat Security Advisory RHSA-2026:5932 vom 2026-03-26","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5931","summary":"Red Hat Security Advisory RHSA-2026:5931 vom 2026-03-26","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5930","summary":"Red Hat Security Advisory RHSA-2026:5930 vom 2026-03-26","category":"external"},{"url":"https://lists.debian.org/debian-security-announce/2026/msg00088.html","summary":"Debian Security Advisory DSA-6179 vom 2026-03-26","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2026/03/msg00014.html","summary":"Debian Security Advisory DLA-4510 vom 2026-03-26","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2026/03/msg00015.html","summary":"Debian Security Advisory DLA-4511 vom 2026-03-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html","summary":"SUSE Security Update SUSE-SU-2026:1126-1 vom 2026-03-28","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html","summary":"SUSE Security Update SUSE-SU-2026:1127-1 vom 2026-03-28","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-5930.html","summary":"Oracle Linux Security Advisory ELSA-2026-5930 vom 2026-03-27","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-5931.html","summary":"Oracle Linux Security Advisory ELSA-2026-5931 vom 2026-03-27","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-5932.html","summary":"Oracle Linux Security Advisory ELSA-2026-5932 vom 2026-03-27","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6188","summary":"Red Hat Security Advisory RHSA-2026:6188 vom 2026-03-30","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-6188.html","summary":"Oracle Linux Security Advisory ELSA-2026-6188 vom 2026-03-31","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ELMKS2KLVJGOTFRHFX4CFYYGKJCR3ZFX/","summary":"openSUSE Security Update OPENSUSE-SU-2026:10447-1 vom 2026-03-31","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6342","summary":"Red Hat Security Advisory RHSA-2026:6342 vom 2026-04-01","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-6342.html","summary":"Oracle Linux Security Advisory ELSA-2026-6342 vom 2026-04-01","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-April/025116.html","summary":"SUSE Security Update SUSE-SU-2026:1163-1 vom 2026-04-01","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YYCV757JWWKCAIP63ZNZ7UWNGGZJPRIV/","summary":"openSUSE Security Update OPENSUSE-SU-2026:10458-1 vom 2026-04-01","category":"external"},{"url":"http://linux.oracle.com/errata/ELSA-2026-6342.html","summary":"Oracle Linux Security Advisory ELSA-2026-6342 vom 2026-04-01","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:5932","summary":"Rocky Linux Security Advisory RLSA-2026:5932 vom 2026-04-07","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:5930","summary":"Rocky Linux Security Advisory RLSA-2026:5930 vom 2026-04-07","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:6188","summary":"Rocky Linux Security Advisory RLSA-2026:6188 vom 2026-04-07","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6917","summary":"Red Hat Security Advisory RHSA-2026:6917 vom 2026-04-08","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-6917.html","summary":"Oracle Linux Security Advisory ELSA-2026-6917 vom 2026-04-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-April/025184.html","summary":"SUSE Security Update SUSE-SU-2026:20978-1 vom 2026-04-09","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:5931","summary":"Rocky Linux Security Advisory RLSA-2026:5931 vom 2026-04-09","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:6342","summary":"Rocky Linux Security Advisory RLSA-2026:6342 vom 2026-04-09","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:6917","summary":"Rocky Linux Security Advisory RLSA-2026:6917 vom 2026-04-12","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:7843","summary":"Red Hat Security Advisory RHSA-2026:7843 vom 2026-04-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:7839","summary":"Red Hat Security Advisory RHSA-2026:7839 vom 2026-04-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:7840","summary":"Red Hat Security Advisory RHSA-2026:7840 vom 2026-04-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:7841","summary":"Red Hat Security Advisory RHSA-2026:7841 vom 2026-04-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:7842","summary":"Red Hat Security Advisory RHSA-2026:7842 vom 2026-04-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:7838","summary":"Red Hat Security Advisory RHSA-2026:7838 vom 2026-04-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:7837","summary":"Red Hat Security Advisory RHSA-2026:7837 vom 2026-04-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:7845","summary":"Red Hat Security Advisory RHSA-2026:7845 vom 2026-04-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:7858","summary":"Red Hat Security Advisory RHSA-2026:7858 vom 2026-04-13","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2FIREFOX-2026-056.html","summary":"Amazon Linux Security Advisory ALAS2FIREFOX-2026-056 vom 2026-04-14","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2-2026-3241.html","summary":"Amazon Linux Security Advisory ALAS2-2026-3241 vom 2026-04-14","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:8284","summary":"Red Hat Security Advisory RHSA-2026:8284 vom 2026-04-15","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:8285","summary":"Red Hat Security Advisory RHSA-2026:8285 vom 2026-04-15","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:8287","summary":"Red Hat Security Advisory RHSA-2026:8287 vom 2026-04-15","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:8288","summary":"Red Hat Security Advisory RHSA-2026:8288 vom 2026-04-15","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:8289","summary":"Red Hat Security Advisory RHSA-2026:8289 vom 2026-04-15","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:8290","summary":"Red Hat Security Advisory RHSA-2026:8290 vom 2026-04-15","category":"external"}],"severity":"high","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2026-20/","published":"2026-03-24","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T03:01:11.191Z","sourceUrl":"https://www.mozilla.org/en-US/security/advisories/mfsa2026-20/","added":"2026-04-14T00:00:00.000Z","public_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2026-20/","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-w-2026-0850 cve-2025-59375 mozilla firefox und mozilla thunderbird: mehrere schwachstellen bsi bsi","public_published":"2026-03-24","public_updated":"2026-04-14","public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"BSI:WID-SEC-W-2026-0935","cve":"CVE-2025-69223","title":"Red Hat Ansible Automation Platform: Mehrere Schwachstellen","date":"2026-03-31","published":"2026-03-31","updated":"2026-04-14","source_published":"2026-03-31","source_updated":"2026-04-14","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://access.redhat.com/errata/RHSA-2026:6308","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0935.json","summary":"WID-SEC-W-2026-0935 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0935","summary":"WID-SEC-2026-0935 - Portal Version","category":"self"},{"url":"https://access.redhat.com/errata/RHSA-2026:6308","summary":"Red Hat Security Advisory vom 2026-03-31","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6309","summary":"Red Hat Security Advisory vom 2026-03-31","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6404","summary":"Red Hat Security Advisory RHSA-2026:6404 vom 2026-04-01","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6278","summary":"Red Hat Security Advisory RHSA-2026:6278 vom 2026-04-01","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2-2026-3215.html","summary":"Amazon Linux Security Advisory ALAS2-2026-3215 vom 2026-04-01","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-April/025088.html","summary":"SUSE Security Update SUSE-SU-2026:20929-1 vom 2026-04-01","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5910","summary":"Red Hat Security Advisory RHSA-2026:5910 vom 2026-04-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-April/025209.html","summary":"SUSE Security Update SUSE-SU-2026:21021-1 vom 2026-04-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:8218","summary":"Red Hat Security Advisory RHSA-2026:8218 vom 2026-04-15","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7269544","summary":"IBM Security Bulletin 7269544 vom 2026-04-15","category":"external"}],"severity":"high","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://access.redhat.com/errata/RHSA-2026:6308","published":"2026-03-31","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"fastlane_seen_at":"2026-04-16T09:01:01.363Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://access.redhat.com/errata/RHSA-2026:6308","added":"2026-04-14T00:00:00.000Z","public_url":"https://access.redhat.com/errata/RHSA-2026:6308","public_source":"Red Hat","public_source_slug":"red-hat","public_published":"2026-03-31","public_updated":"2026-04-14","public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-w-2026-0935 cve-2025-69223 red hat ansible automation platform: mehrere schwachstellen red hat bsi"},{"id":"BSI:WID-SEC-W-2026-0937","cve":"CVE-2026-5272","title":"Google Chrome und Microsoft Edge: Mehrere Schwachstellen","date":"2026-03-31","published":"2026-03-31","updated":"2026-04-14","source_published":"2026-03-31","source_updated":"2026-04-14","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0937.json","summary":"WID-SEC-W-2026-0937 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0937","summary":"WID-SEC-2026-0937 - Portal Version","category":"self"},{"url":"https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html","summary":"Google Chrome Stable Channel Update vom 2026-03-31","category":"external"},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog","summary":"CISA Known Exploited Vulnerabilities Catalog vom 2026-04-01","category":"external"},{"url":"https://learn.microsoft.com/de-de/deployedge/microsoft-edge-relnotes-security#april-1-2026","summary":"Versionshinweise für Microsoft Edge-Sicherheitsupdates vom 2026-04-01","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V44AZOMXJATV6ZUZ7XDKOX3GQ7OOXUHB/","summary":"openSUSE Security Update OPENSUSE-SU-2026:0113-1 vom 2026-04-02","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WNDHZSBBVM5FK3LI2IT4LH2YIF7GGNJ5/","summary":"openSUSE Security Update OPENSUSE-SU-2026:0112-1 vom 2026-04-02","category":"external"},{"url":"https://lists.debian.org/debian-security-announce/2026/msg00101.html","summary":"Debian Security Advisory DSA-6192 vom 2026-04-03","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-2026-bdd01d79ba","summary":"Fedora Security Advisory FEDORA-2026-BDD01D79BA vom 2026-04-02","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2026-3dc5de63cc","summary":"Fedora Security Advisory FEDORA-EPEL-2026-3DC5DE63CC vom 2026-04-02","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2026-189ae4f7fc","summary":"Fedora Security Advisory FEDORA-EPEL-2026-189AE4F7FC vom 2026-04-02","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2026-efc00c94b6","summary":"Fedora Security Advisory FEDORA-EPEL-2026-EFC00C94B6 vom 2026-04-02","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2026-6a5f534eb8","summary":"Fedora Security Advisory FEDORA-EPEL-2026-6A5F534EB8 vom 2026-04-02","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-2026-450ba465fd","summary":"Fedora Security Advisory FEDORA-2026-450BA465FD vom 2026-04-02","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-2026-2b2e6a12de","summary":"Fedora Security Advisory FEDORA-2026-2B2E6A12DE vom 2026-04-02","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7AM5VO7W6ROAUJ32C4NL6IJGVNAFDX6E/","summary":"openSUSE Security Update OPENSUSE-SU-2026:20460-1 vom 2026-04-04","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-2026-ffdca48c25","summary":"Fedora Security Advisory FEDORA-2026-FFDCA48C25 vom 2026-04-15","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-2026-83fdfd7e0e","summary":"Fedora Security Advisory FEDORA-2026-83FDFD7E0E vom 2026-04-15","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-2026-e0c31e9e7e","summary":"Fedora Security Advisory FEDORA-2026-E0C31E9E7E vom 2026-04-15","category":"external"},{"url":"https://kb.igel.com/en/security-safety/current/isn-2026-10-chromium-vulnerabilities-exploited-in-the-wild","summary":"IGEL Security Notice ISN-2026-10 vom 2026-04-15","category":"external"}],"severity":"high","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html","published":"2026-03-31","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T09:01:01.363Z","sourceUrl":"https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html","added":"2026-04-14T00:00:00.000Z","public_url":"https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-w-2026-0937 cve-2026-5272 google chrome und microsoft edge: mehrere schwachstellen bsi bsi","public_published":"2026-03-31","public_updated":"2026-04-14","public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"BSI:WID-SEC-W-2026-0950","cve":"CVE-2026-23401","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-03-31","published":"2026-03-31","updated":"2026-04-14","source_published":"2026-03-31","source_updated":"2026-04-14","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://lore.kernel.org/linux-cve-announce/","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0950.json","summary":"WID-SEC-W-2026-0950 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0950","summary":"WID-SEC-2026-0950 - Portal Version","category":"self"},{"url":"https://lore.kernel.org/linux-cve-announce/","summary":"Kernel CVE Announce Mailingliste","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040108-CVE-2026-23401-956d@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23401","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040110-CVE-2026-23402-c852@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23402","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040111-CVE-2026-23403-f22c@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23403","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040111-CVE-2026-23404-8b0b@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23404","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040111-CVE-2026-23405-0e7a@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23405","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040112-CVE-2026-23406-0cb2@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23406","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040112-CVE-2026-23407-297e@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23407","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040113-CVE-2026-23408-1932@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23408","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040113-CVE-2026-23409-ae18@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23409","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040113-CVE-2026-23410-d7d5@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23410","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040114-CVE-2026-23411-00f7@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23411","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-50170.html","summary":"Oracle Linux Security Advisory ELSA-2026-50170 vom 2026-04-01","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8152-1","summary":"Ubuntu Security Notice USN-8152-1 vom 2026-04-07","category":"external"},{"url":"https://msrc.microsoft.com/update-guide/","summary":"Microsoft Leitfaden für Sicherheitsupdates vom 2026-04-03","category":"external"},{"url":"https://msrc.microsoft.com/update-guide/","summary":"Microsoft Leitfaden für Sicherheitsupdates vom 2026-04-07","category":"external"},{"url":"https://msrc.microsoft.com/update-guide/","summary":"Microsoft Leitfaden für Sicherheitsupdates vom 2026-04-08","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8165-1","summary":"Ubuntu Security Notice USN-8165-1 vom 2026-04-10","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8164-1","summary":"Ubuntu Security Notice USN-8164-1 vom 2026-04-10","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8163-1","summary":"Ubuntu Security Notice USN-8163-1 vom 2026-04-10","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8163-2","summary":"Ubuntu Security Notice USN-8163-2 vom 2026-04-14","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://lore.kernel.org/linux-cve-announce/","published":"2026-03-31","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-14T22:16:17.049Z","sourceUrl":"https://lore.kernel.org/linux-cve-announce/","added":"2026-04-14T00:00:00.000Z","public_url":"https://lore.kernel.org/linux-cve-announce/","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-w-2026-0950 cve-2026-23401 linux kernel: mehrere schwachstellen bsi bsi","public_published":"2026-03-31","public_updated":"2026-04-14","public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"BSI:WID-SEC-W-2026-1008","cve":"CVE-2026-33825","title":"Microsoft Defender: Schwachstelle ermöglicht Privilegieneskalation","date":"2026-04-07","published":"2026-04-07","updated":"2026-04-14","source_published":"2026-04-07","source_updated":"2026-04-14","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://deadeclipse666.blogspot.com/2026/04/public-disclosure.html","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1008.json","summary":"WID-SEC-W-2026-1008 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1008","summary":"WID-SEC-2026-1008 - Portal Version","category":"self"},{"url":"https://deadeclipse666.blogspot.com/2026/04/public-disclosure.html","summary":"Chaotic Eclipse Blog vom 2026-04-07","category":"external"},{"url":"https://github.com/Nightmare-Eclipse/BlueHammer","summary":"BlueHammer Exploit vom 2026-04-07","category":"external"},{"url":"https://infosec.exchange/@wdormann/116358064691025711","summary":"infosec.exchange user Will Dormann vom 2026-04-07","category":"external"},{"url":"https://socradar.io/blog/bluehammer-windows-zero-day-privilege-escalation-risk/","summary":"SOC-Radar Analysis vom 2026-04-07","category":"external"},{"url":"https://infosec.exchange/@wdormann/116404516592597593","summary":"infosec.exchange user Will Dormann vom 2026-04-14","category":"external"}],"severity":"high","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://deadeclipse666.blogspot.com/2026/04/public-disclosure.html","published":"2026-04-07","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T09:00:48.880Z","sourceUrl":"https://deadeclipse666.blogspot.com/2026/04/public-disclosure.html","added":"2026-04-14T00:00:00.000Z","public_url":"https://deadeclipse666.blogspot.com/2026/04/public-disclosure.html","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-w-2026-1008 cve-2026-33825 microsoft defender: schwachstelle ermöglicht privilegieneskalation bsi bsi","public_published":"2026-04-07","public_updated":"2026-04-14","public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"BSI:WID-SEC-W-2026-1054","cve":"CVE-2026-40021","title":"Apache log4net: Schwachstelle ermöglicht Manipulation von Dateien","date":"2026-04-12","published":"2026-04-12","updated":"2026-04-14","source_published":"2026-04-12","source_updated":"2026-04-14","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://github.com/advisories/GHSA-4f7c-pmjv-c25w","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1054.json","summary":"WID-SEC-W-2026-1054 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1054","summary":"WID-SEC-2026-1054 - Portal Version","category":"self"},{"url":"https://github.com/advisories/GHSA-4f7c-pmjv-c25w","summary":"GitHub Security Advisory GHSA-4f7c-pmjv-c25w vom 2026-04-12","category":"external"}],"severity":"low","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://github.com/advisories/GHSA-4f7c-pmjv-c25w","published":"2026-04-12","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-14T22:16:17.049Z","sourceUrl":"https://github.com/advisories/GHSA-4f7c-pmjv-c25w","added":"2026-04-14T00:00:00.000Z","public_url":"https://github.com/advisories/GHSA-4f7c-pmjv-c25w","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"low","search_text":"bsi:wid-sec-w-2026-1054 cve-2026-40021 apache log4net: schwachstelle ermöglicht manipulation von dateien bsi bsi","public_published":"2026-04-12","public_updated":"2026-04-14","public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"BSI:WID-SEC-W-2026-1096","cve":"CVE-2025-61624","title":"Fortinet FortiOS, FortiProxy und FortiSwitch: Schwachstelle ermöglicht Manipulation von Dateien","date":"2026-04-14","published":"2026-04-14","updated":null,"source_published":"2026-04-14","source_updated":"2026-04-14","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://www.fortiguard.com/psirt/FG-IR-26-122","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1096.json","summary":"WID-SEC-W-2026-1096 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1096","summary":"WID-SEC-2026-1096 - Portal Version","category":"self"},{"url":"https://www.fortiguard.com/psirt/FG-IR-26-122","summary":"FortiGuard Labs PSIRT Advisory FG-IR-26-122 vom 2026-04-14","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://www.fortiguard.com/psirt/FG-IR-26-122","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T06:26:45.891Z","sourceUrl":"https://www.fortiguard.com/psirt/FG-IR-26-122","added":"2026-04-14T00:00:00.000Z","public_url":"https://www.fortiguard.com/psirt/FG-IR-26-122","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-w-2026-1096 cve-2025-61624 fortinet fortios, fortiproxy und fortiswitch: schwachstelle ermöglicht manipulation von dateien bsi bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"BSI:WID-SEC-W-2026-1097","cve":"CVE-2024-23104","title":"Fortinet FortiVoice: Schwachstelle ermöglicht Offenlegung von Informationen","date":"2026-04-14","published":"2026-04-14","updated":null,"source_published":"2026-04-14","source_updated":"2026-04-14","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://www.fortiguard.com/psirt/FG-IR-26-124","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1097.json","summary":"WID-SEC-W-2026-1097 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1097","summary":"WID-SEC-2026-1097 - Portal Version","category":"self"},{"url":"https://www.fortiguard.com/psirt/FG-IR-26-124","summary":"FortiGuard Labs PSIRT Advisory FG-IR-26-124 vom 2026-04-14","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://www.fortiguard.com/psirt/FG-IR-26-124","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T06:26:45.891Z","sourceUrl":"https://www.fortiguard.com/psirt/FG-IR-26-124","added":"2026-04-14T00:00:00.000Z","public_url":"https://www.fortiguard.com/psirt/FG-IR-26-124","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-w-2026-1097 cve-2024-23104 fortinet fortivoice: schwachstelle ermöglicht offenlegung von informationen bsi bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"BSI:WID-SEC-W-2026-1098","cve":"CVE-2026-32168","title":"Microsoft Azure: Mehrere Schwachstellen ermöglichen Privilegieneskalation","date":"2026-04-14","published":"2026-04-14","updated":null,"source_published":"2026-04-14","source_updated":"2026-04-14","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://msrc.microsoft.com/update-guide/","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1098.json","summary":"WID-SEC-W-2026-1098 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1098","summary":"WID-SEC-2026-1098 - Portal Version","category":"self"},{"url":"https://msrc.microsoft.com/update-guide/","summary":"Microsoft Leitfaden für Sicherheitsupdates","category":"external"}],"severity":"high","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://msrc.microsoft.com/update-guide/","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T06:26:45.891Z","sourceUrl":"https://msrc.microsoft.com/update-guide/","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-w-2026-1098 cve-2026-32168 microsoft azure: mehrere schwachstellen ermöglichen privilegieneskalation msrc bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"BSI:WID-SEC-W-2026-1099","cve":"CVE-2026-33825","title":"Microsoft Defender: Schwachstelle ermöglicht Erlangen von Administratorrechten","date":"2026-04-14","published":"2026-04-14","updated":null,"source_published":"2026-04-14","source_updated":"2026-04-14","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://msrc.microsoft.com/update-guide/","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1099.json","summary":"WID-SEC-W-2026-1099 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1099","summary":"WID-SEC-2026-1099 - Portal Version","category":"self"},{"url":"https://msrc.microsoft.com/update-guide/","summary":"Microsoft Leitfaden für Sicherheitsupdates","category":"external"},{"url":"https://infosec.exchange/@wdormann/116404516592597593","summary":"Blog Post Will Dormann vom 2026-04-14","category":"external"}],"severity":"high","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://msrc.microsoft.com/update-guide/","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T09:00:48.880Z","sourceUrl":"https://msrc.microsoft.com/update-guide/","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-w-2026-1099 cve-2026-33825 microsoft defender: schwachstelle ermöglicht erlangen von administratorrechten msrc bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"BSI:WID-SEC-W-2026-1100","cve":"CVE-2026-21637","title":"Microsoft DeveloperTools: Mehrere Schwachstellen","date":"2026-04-14","published":"2026-04-14","updated":null,"source_published":"2026-04-14","source_updated":"2026-04-14","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://msrc.microsoft.com/update-guide/","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1100.json","summary":"WID-SEC-W-2026-1100 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1100","summary":"WID-SEC-2026-1100 - Portal Version","category":"self"},{"url":"https://msrc.microsoft.com/update-guide/","summary":"Microsoft Leitfaden für Sicherheitsupdates","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://msrc.microsoft.com/update-guide/","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T06:26:45.891Z","sourceUrl":"https://msrc.microsoft.com/update-guide/","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-w-2026-1100 cve-2026-21637 microsoft developertools: mehrere schwachstellen msrc bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"BSI:WID-SEC-W-2026-1119","cve":"CVE-2026-33999","title":"X.Org X11, Xwayland: Mehrere Schwachstellen","date":"2026-04-14","published":"2026-04-14","updated":null,"source_published":"2026-04-14","source_updated":"2026-04-14","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://lists.x.org/archives/xorg-announce/2026-April/003677.html","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1119.json","summary":"WID-SEC-W-2026-1119 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1119","summary":"WID-SEC-2026-1119 - Portal Version","category":"self"},{"url":"https://lists.x.org/archives/xorg-announce/2026-April/003677.html","summary":"X.Org Security Advisory vom 2026-04-14","category":"external"},{"url":"https://lists.x.org/archives/xorg-announce/2026-April/003678.html","summary":"xorg-server 21.1.22 announcement vom 2026-04-14","category":"external"},{"url":"https://lists.x.org/archives/xorg-announce/2026-April/003679.html","summary":"xwayland 24.1.10 announcement vom 2026-04-14","category":"external"},{"url":"https://www.openbsd.org/errata77.html","summary":"OpenBSD Errata 7.7 vom 2026-04-14","category":"external"},{"url":"https://www.openbsd.org/errata78.html","summary":"OpenBSD Errata 7.8 vom 2026-04-14","category":"external"},{"url":"http://www.openbsd.org/errata78.html","summary":"OpenBSD 7.8 Errata vom 2026-04-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-April/025341.html","summary":"SUSE Security Update SUSE-SU-2026:1330-1 vom 2026-04-15","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-2026-2c6941716b","summary":"Fedora Security Advisory FEDORA-2026-2C6941716B vom 2026-04-15","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-2026-a7ec361237","summary":"Fedora Security Advisory FEDORA-2026-A7EC361237 vom 2026-04-15","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-2026-922a6d4e1a","summary":"Fedora Security Advisory FEDORA-2026-922A6D4E1A vom 2026-04-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-April/025340.html","summary":"SUSE Security Update SUSE-SU-2026:1331-1 vom 2026-04-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-April/025339.html","summary":"SUSE Security Update SUSE-SU-2026:1332-1 vom 2026-04-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-April/025342.html","summary":"SUSE Security Update SUSE-SU-2026:1329-1 vom 2026-04-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-April/025343.html","summary":"SUSE Security Update SUSE-SU-2026:1328-1 vom 2026-04-15","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-2026-cf9e55a7a0","summary":"Fedora Security Advisory FEDORA-2026-CF9E55A7A0 vom 2026-04-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-April/025337.html","summary":"SUSE Security Update SUSE-SU-2026:1335-1 vom 2026-04-15","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-2026-c0163d5a73","summary":"Fedora Security Advisory FEDORA-2026-C0163D5A73 vom 2026-04-15","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-2026-beff97a194","summary":"Fedora Security Advisory FEDORA-2026-BEFF97A194 vom 2026-04-15","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://lists.x.org/archives/xorg-announce/2026-April/003677.html","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-16T09:01:01.363Z","sourceUrl":"https://lists.x.org/archives/xorg-announce/2026-April/003677.html","added":"2026-04-14T00:00:00.000Z","public_url":"https://lists.x.org/archives/xorg-announce/2026-April/003677.html","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-w-2026-1119 cve-2026-33999 x.org x11, xwayland: mehrere schwachstellen bsi bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"BSI:WID-SEC-W-2026-1120","cve":"CVE-2026-4913","title":"Ivanti Neurons for ITSM: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen","date":"2026-04-14","published":"2026-04-14","updated":null,"source_published":"2026-04-14","source_updated":"2026-04-14","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://hub.ivanti.com/s/article/Security-Advisory-Ivanti-Neurons-for-ITSM-CVE-2026-4913-CVE-2026-4914","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1120.json","summary":"WID-SEC-W-2026-1120 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1120","summary":"WID-SEC-2026-1120 - Portal Version","category":"self"},{"url":"https://hub.ivanti.com/s/article/Security-Advisory-Ivanti-Neurons-for-ITSM-CVE-2026-4913-CVE-2026-4914","summary":"Security Advisory Ivanti Neurons for ITSM (CVE-2026-4913, CVE-2026-4914) vom 2026-04-14","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://hub.ivanti.com/s/article/Security-Advisory-Ivanti-Neurons-for-ITSM-CVE-2026-4913-CVE-2026-4914","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"fastlane_seen_at":"2026-04-15T09:00:48.880Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://hub.ivanti.com/s/article/Security-Advisory-Ivanti-Neurons-for-ITSM-CVE-2026-4913-CVE-2026-4914","added":"2026-04-14T00:00:00.000Z","public_url":"https://hub.ivanti.com/s/article/Security-Advisory-Ivanti-Neurons-for-ITSM-CVE-2026-4913-CVE-2026-4914","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-w-2026-1120 cve-2026-4913 ivanti neurons for itsm: mehrere schwachstellen ermöglichen offenlegung von informationen bsi bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"BSI:WID-SEC-W-2026-1121","cve":"CVE-2026-5713","title":"CPython: Schwachstelle ermöglicht Manipulation von Daten","date":"2026-04-14","published":"2026-04-14","updated":null,"source_published":"2026-04-14","source_updated":"2026-04-14","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://github.com/python/cpython/issues/148178","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1121.json","summary":"WID-SEC-W-2026-1121 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1121","summary":"WID-SEC-2026-1121 - Portal Version","category":"self"},{"url":"https://github.com/python/cpython/issues/148178","summary":"CPython GitHub Issue vom 2026-04-14","category":"external"},{"url":"https://github.com/python/cpython/commit/289fd2c97a7e5aecb8b69f94f5e838ccfeee7e67","summary":"CPython GitHub Commit vom 2026-04-14","category":"external"},{"url":"https://github.com/python/cpython/pull/148187","summary":"CPython GitHub Pull Request vom 2026-04-14","category":"external"},{"url":"https://euvd.enisa.europa.eu/enisa/EUVD-2026-22311","summary":"EUVD-2026-22311 vom 2026-04-14","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://github.com/python/cpython/issues/148178","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"fastlane_seen_at":"2026-04-15T09:00:48.880Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://github.com/python/cpython/issues/148178","added":"2026-04-14T00:00:00.000Z","public_url":"https://github.com/python/cpython/issues/148178","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-w-2026-1121 cve-2026-5713 cpython: schwachstelle ermöglicht manipulation von daten bsi bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"BSI:WID-SEC-W-2026-1127","cve":"CVE-2026-39865","title":"IBM App Connect Enterprise Certified Container (axios): Schwachstelle ermöglicht Denial of Service","date":"2026-04-14","published":"2026-04-14","updated":null,"source_published":"2026-04-14","source_updated":"2026-04-14","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://www.ibm.com/support/pages/node/7269524","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1127.json","summary":"WID-SEC-W-2026-1127 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1127","summary":"WID-SEC-2026-1127 - Portal Version","category":"self"},{"url":"https://www.ibm.com/support/pages/node/7269524","summary":"IBM Security Bulletin 7269524 vom 2026-04-14","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://www.ibm.com/support/pages/node/7269524","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T11:33:18.649Z","sourceUrl":"https://www.ibm.com/support/pages/node/7269524","added":"2026-04-14T00:00:00.000Z","public_url":"https://www.ibm.com/support/pages/node/7269524","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-w-2026-1127 cve-2026-39865 ibm app connect enterprise certified container (axios): schwachstelle ermöglicht denial of service bsi bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"BSI:WID-SEC-W-2026-1128","cve":"CVE-2026-40176","title":"Composer: Mehrere Schwachstellen ermöglichen Codeausführung","date":"2026-04-14","published":"2026-04-14","updated":null,"source_published":"2026-04-14","source_updated":"2026-04-14","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://github.com/composer/composer/security/advisories/GHSA-gqw4-4w2p-838q","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1128.json","summary":"WID-SEC-W-2026-1128 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1128","summary":"WID-SEC-2026-1128 - Portal Version","category":"self"},{"url":"https://github.com/composer/composer/security/advisories/GHSA-gqw4-4w2p-838q","summary":"GitHub Security Advisory GHSA-gqw4-4w2p-838q vom 2026-04-14","category":"external"},{"url":"https://github.com/composer/composer/security/advisories/GHSA-wg36-wvj6-r67p","summary":"GitHub Security Advisory GHSA-wg36-wvj6-r67p vom 2026-04-14","category":"external"}],"severity":"high","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://github.com/composer/composer/security/advisories/GHSA-gqw4-4w2p-838q","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-15T11:33:18.649Z","sourceUrl":"https://github.com/composer/composer/security/advisories/GHSA-gqw4-4w2p-838q","added":"2026-04-14T00:00:00.000Z","public_url":"https://github.com/composer/composer/security/advisories/GHSA-gqw4-4w2p-838q","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-w-2026-1128 cve-2026-40176 composer: mehrere schwachstellen ermöglichen codeausführung bsi bsi","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2023-20585","cve":"CVE-2023-20585","title":"AMD: CVE-2023-20585 IOMMU Write Buffer Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-20585","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-20585","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-20585","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.3,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-20585","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-20585","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2023-20585 cve-2023-20585 amd: cve-2023-20585 iommu write buffer vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2025-6965","cve":"CVE-2025-6965","title":"Integer Truncation on SQLite","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6965","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6965","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6965","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6965","added":"2026-04-14T00:00:00.000Z","primary_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6965","primary_published":"2025-07-08","primary_updated":null,"primary_kind":"vendor","primary_source":"MSRC","primary_id":"CVE-2025-6965","primaryUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6965","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6965","public_source":"MSRC","public_source_slug":"msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2025-6965 cve-2025-6965 integer truncation on sqlite microsoft msrc msrc"},{"id":"CVE-2026-0390","cve":"CVE-2026-0390","title":"UEFI Secure Boot Security Feature Bypass Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-0390","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-0390","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-0390","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.7,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-0390","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-0390","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-0390 cve-2026-0390 uefi secure boot security feature bypass vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-20806","cve":"CVE-2026-20806","title":"Windows COM Server Information Disclosure Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20806","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20806","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20806","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20806","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20806","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-20806 cve-2026-20806 windows com server information disclosure vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-20928","cve":"CVE-2026-20928","title":"Windows Recovery Environment Security Feature Bypass Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20928","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20928","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20928","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.6,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20928","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20928","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-20928 cve-2026-20928 windows recovery environment security feature bypass vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-20930","cve":"CVE-2026-20930","title":"Windows Management Services Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20930","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20930","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20930","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":"2026-04-14","cve_updated":"2026-04-14","link_checked_at":null,"published_at":"2026-04-14","updated_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20930","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20930","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-20930 cve-2026-20930 windows management services elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-20945","cve":"CVE-2026-20945","title":"Microsoft SharePoint Server Spoofing Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20945","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20945","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20945","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.6,"cve_published":"2026-04-14","cve_updated":"2026-04-14","published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20945","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20945","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-20945 cve-2026-20945 microsoft sharepoint server spoofing vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-21637","cve":"CVE-2026-21637","title":"HackerOne: CVE-2026-21637 TLS PSK/ALPN Callback Exceptions Bypass Error Handlers","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21637","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21637","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21637","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21637","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21637","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-21637 cve-2026-21637 hackerone: cve-2026-21637 tls psk/alpn callback exceptions bypass error handlers microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-23401","cve":"CVE-2026-23401","title":"KVM: x86/mmu: Drop/zap existing present SPTE even when creating an MMIO SPTE","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23401","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23401","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23401","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.4,"cve_published":"2026-04-01","cve_updated":"2026-04-02","published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23401","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23401","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-23401 cve-2026-23401 kvm: x86/mmu: drop/zap existing present spte even when creating an mmio spte microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14","source_url_repaired_from":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23401"},{"id":"CVE-2026-23403","cve":"CVE-2026-23403","title":"apparmor: fix memory leak in verify_header","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23403","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23403","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23403","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23403","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23403","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-23403 cve-2026-23403 apparmor: fix memory leak in verify_header microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-23404","cve":"CVE-2026-23404","title":"apparmor: replace recursive profile removal with iterative approach","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23404","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23404","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23404","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23404","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23404","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-23404 cve-2026-23404 apparmor: replace recursive profile removal with iterative approach microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-23405","cve":"CVE-2026-23405","title":"apparmor: fix: limit the number of levels of policy namespaces","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23405","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23405","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23405","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23405","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23405","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-23405 cve-2026-23405 apparmor: fix: limit the number of levels of policy namespaces microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-23406","cve":"CVE-2026-23406","title":"apparmor: fix side-effect bug in match_char() macro usage","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23406","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23406","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23406","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23406","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23406","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-23406 cve-2026-23406 apparmor: fix side-effect bug in match_char() macro usage microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-23407","cve":"CVE-2026-23407","title":"apparmor: fix missing bounds check on DEFAULT table in verify_dfa()","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23407","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23407","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23407","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23407","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23407","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-23407 cve-2026-23407 apparmor: fix missing bounds check on default table in verify_dfa() microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-23408","cve":"CVE-2026-23408","title":"apparmor: Fix double free of ns_name in aa_replace_profiles()","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23408","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23408","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23408","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23408","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23408","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-23408 cve-2026-23408 apparmor: fix double free of ns_name in aa_replace_profiles() microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-23409","cve":"CVE-2026-23409","title":"apparmor: fix differential encoding verification","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23409","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23409","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23409","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23409","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23409","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-23409 cve-2026-23409 apparmor: fix differential encoding verification microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-23410","cve":"CVE-2026-23410","title":"apparmor: fix race on rawdata dereference","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23410","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23410","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23410","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23410","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23410","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-23410 cve-2026-23410 apparmor: fix race on rawdata dereference microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-23411","cve":"CVE-2026-23411","title":"apparmor: fix race between freeing data and fs accessing it","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23411","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23411","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23411","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23411","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23411","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-23411 cve-2026-23411 apparmor: fix race between freeing data and fs accessing it microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-23442","cve":"CVE-2026-23442","title":"ipv6: add NULL checks for idev in SRv6 paths","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23442","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23442","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23442","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23442","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23442","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-23442 cve-2026-23442 ipv6: add null checks for idev in srv6 paths microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14","source_url_repaired_from":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23442"},{"id":"CVE-2026-23444","cve":"CVE-2026-23444","title":"wifi: mac80211: always free skb on ieee80211_tx_prepare_skb() failure","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23444","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23444","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23444","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23444","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23444","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-23444 cve-2026-23444 wifi: mac80211: always free skb on ieee80211_tx_prepare_skb() failure microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-23472","cve":"CVE-2026-23472","title":"serial: core: fix infinite loop in handle_tx() for PORT_UNKNOWN","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23472","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23472","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23472","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23472","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23472","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-23472 cve-2026-23472 serial: core: fix infinite loop in handle_tx() for port_unknown microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-23653","cve":"CVE-2026-23653","title":"GitHub Copilot and Visual Studio Code Information Disclosure Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23653","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23653","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23653","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.7,"cve_published":"2026-04-14","cve_updated":"2026-04-14","published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23653","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23653","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-23653 cve-2026-23653 github copilot and visual studio code information disclosure vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-23657","cve":"CVE-2026-23657","title":"Microsoft Word Remote Code Execution Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23657","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23657","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23657","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23657","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23657","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-23657 cve-2026-23657 microsoft word remote code execution vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-23666","cve":"CVE-2026-23666","title":".NET Framework Denial of Service Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23666","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23666","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23666","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23666","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23666","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-23666 cve-2026-23666 .net framework denial of service vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-23670","cve":"CVE-2026-23670","title":"Windows Virtualization-Based Security (VBS) Security Feature Bypass Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23670","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23670","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23670","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.7,"cve_published":"2026-04-14","cve_updated":"2026-04-14","published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23670","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23670","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-23670 cve-2026-23670 windows virtualization-based security (vbs) security feature bypass vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-25184","cve":"CVE-2026-25184","title":"Applocker Filter Driver (applockerfltr.sys) Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-25184","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-25184","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-25184","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":"2026-04-14","cve_updated":"2026-04-14","published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-25184","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-25184","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-25184 cve-2026-25184 applocker filter driver (applockerfltr.sys) elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-25250","cve":"CVE-2026-25250","title":"MITRE: CVE-2026-25250 Secure Boot disable Eazy Fix","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-25250","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-25250","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-25250","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-25250","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-25250","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-25250 cve-2026-25250 mitre: cve-2026-25250 secure boot disable eazy fix microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-26143","cve":"CVE-2026-26143","title":"Microsoft PowerShell Security Feature Bypass Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26143","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26143","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26143","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26143","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26143","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-26143 cve-2026-26143 microsoft powershell security feature bypass vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-26149","cve":"CVE-2026-26149","title":"Microsoft Power Apps Security Feature Bypass","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26149","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26149","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26149","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9,"cve_published":"2026-04-14","cve_updated":"2026-04-14","published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26149","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26149","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"critical","search_text":"cve-2026-26149 cve-2026-26149 microsoft power apps security feature bypass microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-26151","cve":"CVE-2026-26151","title":"Remote Desktop Spoofing Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26151","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26151","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26151","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":"2026-04-14","cve_updated":"2026-04-14","published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26151","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26151","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-26151 cve-2026-26151 remote desktop spoofing vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-26152","cve":"CVE-2026-26152","title":"Microsoft Cryptographic Services Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26152","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26152","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26152","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26152","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26152","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-26152 cve-2026-26152 microsoft cryptographic services elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-26153","cve":"CVE-2026-26153","title":"Windows Encrypted File System (EFS) Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26153","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26153","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26153","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26153","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26153","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-26153 cve-2026-26153 windows encrypted file system (efs) elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-26154","cve":"CVE-2026-26154","title":"Windows Server Update Service (WSUS) Tampering Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26154","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26154","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26154","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26154","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26154","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-26154 cve-2026-26154 windows server update service (wsus) tampering vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-26155","cve":"CVE-2026-26155","title":"Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26155","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26155","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26155","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26155","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26155","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-26155 cve-2026-26155 microsoft local security authority subsystem service information disclosure vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-26156","cve":"CVE-2026-26156","title":"Windows Hyper-V Remote Code Execution Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26156","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26156","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26156","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26156","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26156","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-26156 cve-2026-26156 windows hyper-v remote code execution vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-26159","cve":"CVE-2026-26159","title":"Remote Desktop Licensing Service Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26159","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26159","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26159","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26159","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26159","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-26159 cve-2026-26159 remote desktop licensing service elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-26160","cve":"CVE-2026-26160","title":"Remote Desktop Licensing Service Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26160","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26160","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26160","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26160","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26160","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-26160 cve-2026-26160 remote desktop licensing service elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-26161","cve":"CVE-2026-26161","title":"Windows Sensor Data Service Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26161","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26161","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26161","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26161","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26161","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-26161 cve-2026-26161 windows sensor data service elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-26162","cve":"CVE-2026-26162","title":"Windows OLE Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26162","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26162","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26162","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26162","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26162","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-26162 cve-2026-26162 windows ole elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-26163","cve":"CVE-2026-26163","title":"Windows Kernel Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26163","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26163","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26163","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26163","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26163","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-26163 cve-2026-26163 windows kernel elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-26165","cve":"CVE-2026-26165","title":"Windows Shell Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26165","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26165","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26165","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26165","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26165","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-26165 cve-2026-26165 windows shell elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-26166","cve":"CVE-2026-26166","title":"Windows Shell Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26166","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26166","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26166","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26166","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26166","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-26166 cve-2026-26166 windows shell elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-26167","cve":"CVE-2026-26167","title":"Windows Push Notifications Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26167","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26167","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26167","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26167","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26167","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-26167 cve-2026-26167 windows push notifications elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-26168","cve":"CVE-2026-26168","title":"Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26168","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26168","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26168","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26168","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26168","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-26168 cve-2026-26168 windows ancillary function driver for winsock elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-26169","cve":"CVE-2026-26169","title":"Windows Kernel Memory Information Disclosure Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26169","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26169","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26169","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.1,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26169","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26169","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-26169 cve-2026-26169 windows kernel memory information disclosure vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-26170","cve":"CVE-2026-26170","title":"PowerShell Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26170","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26170","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26170","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26170","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26170","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-26170 cve-2026-26170 powershell elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-26172","cve":"CVE-2026-26172","title":"Windows Push Notifications Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26172","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26172","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26172","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26172","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26172","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-26172 cve-2026-26172 windows push notifications elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-26173","cve":"CVE-2026-26173","title":"Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26173","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26173","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26173","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26173","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26173","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-26173 cve-2026-26173 windows ancillary function driver for winsock elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-26174","cve":"CVE-2026-26174","title":"Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26174","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26174","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26174","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26174","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26174","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-26174 cve-2026-26174 windows server update service (wsus) elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-26175","cve":"CVE-2026-26175","title":"Windows Boot Manager Security Feature Bypass Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26175","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26175","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26175","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.6,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26175","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26175","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-26175 cve-2026-26175 windows boot manager security feature bypass vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-26176","cve":"CVE-2026-26176","title":"Windows Client Side Caching driver (csc.sys) Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26176","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26176","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26176","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26176","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26176","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-26176 cve-2026-26176 windows client side caching driver (csc.sys) elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-26177","cve":"CVE-2026-26177","title":"Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26177","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26177","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26177","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26177","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26177","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-26177 cve-2026-26177 windows ancillary function driver for winsock elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-26178","cve":"CVE-2026-26178","title":"Windows Advanced Rasterization Platform Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26178","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26178","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26178","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26178","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26178","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-26178 cve-2026-26178 windows advanced rasterization platform elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-26179","cve":"CVE-2026-26179","title":"Windows Kernel Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26179","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26179","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26179","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26179","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26179","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-26179 cve-2026-26179 windows kernel elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-26180","cve":"CVE-2026-26180","title":"Windows Kernel Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26180","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26180","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26180","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26180","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26180","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-26180 cve-2026-26180 windows kernel elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-26181","cve":"CVE-2026-26181","title":"Microsoft Brokering File System Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26181","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26181","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26181","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26181","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26181","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-26181 cve-2026-26181 microsoft brokering file system elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-26182","cve":"CVE-2026-26182","title":"Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26182","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26182","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26182","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26182","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26182","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-26182 cve-2026-26182 windows ancillary function driver for winsock elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-26183","cve":"CVE-2026-26183","title":"Remote Access Management service/API (RPC server) Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26183","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26183","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26183","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26183","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26183","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-26183 cve-2026-26183 remote access management service/api (rpc server) elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-26184","cve":"CVE-2026-26184","title":"Windows Projected File System Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26184","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26184","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26184","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26184","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26184","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-26184 cve-2026-26184 windows projected file system elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-27140","cve":"CVE-2026-27140","title":"Code execution vulnerability in SWIG code generation in cmd/go","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27140","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27140","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27140","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27140","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27140","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"critical","search_text":"cve-2026-27140 cve-2026-27140 code execution vulnerability in swig code generation in cmd/go microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-27143","cve":"CVE-2026-27143","title":"Missing bound checks can lead to memory corruption in safe Go in cmd/compile","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27143","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27143","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27143","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27143","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27143","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"critical","search_text":"cve-2026-27143 cve-2026-27143 missing bound checks can lead to memory corruption in safe go in cmd/compile microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-27144","cve":"CVE-2026-27144","title":"Miscompilation allows memory corruption via CONVNOP-wrapped array copy in cmd/compile","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27144","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27144","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27144","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.7,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27144","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27144","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-27144 cve-2026-27144 miscompilation allows memory corruption via convnop-wrapped array copy in cmd/compile microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-27456","cve":"CVE-2026-27456","title":"util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27456","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27456","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27456","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.7,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27456","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27456","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-27456 cve-2026-27456 util-linux: toctou race condition in util-linux mount(8) - loop device setup microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-27906","cve":"CVE-2026-27906","title":"Windows Hello Security Feature Bypass Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27906","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27906","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27906","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.4,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27906","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27906","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-27906 cve-2026-27906 windows hello security feature bypass vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-27907","cve":"CVE-2026-27907","title":"Windows Storage Spaces Controller Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27907","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27907","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27907","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27907","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27907","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-27907 cve-2026-27907 windows storage spaces controller elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-27908","cve":"CVE-2026-27908","title":"Windows TDI Translation Driver (tdx.sys) Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27908","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27908","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27908","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27908","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27908","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-27908 cve-2026-27908 windows tdi translation driver (tdx.sys) elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-27909","cve":"CVE-2026-27909","title":"Windows Search Service Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27909","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27909","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27909","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27909","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27909","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-27909 cve-2026-27909 windows search service elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-27910","cve":"CVE-2026-27910","title":"Windows Installer Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27910","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27910","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27910","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27910","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27910","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-27910 cve-2026-27910 windows installer elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-27911","cve":"CVE-2026-27911","title":"Windows User Interface Core Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27911","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27911","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27911","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27911","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27911","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-27911 cve-2026-27911 windows user interface core elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-27912","cve":"CVE-2026-27912","title":"Windows Kerberos Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27912","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27912","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27912","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27912","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27912","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-27912 cve-2026-27912 windows kerberos elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-27913","cve":"CVE-2026-27913","title":"Windows BitLocker Security Feature Bypass Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27913","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27913","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27913","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.7,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27913","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27913","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-27913 cve-2026-27913 windows bitlocker security feature bypass vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-27914","cve":"CVE-2026-27914","title":"Microsoft Management Console Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27914","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27914","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27914","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27914","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27914","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-27914 cve-2026-27914 microsoft management console elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-27915","cve":"CVE-2026-27915","title":"Windows UPnP Device Host Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27915","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27915","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27915","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27915","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27915","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-27915 cve-2026-27915 windows upnp device host elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-27916","cve":"CVE-2026-27916","title":"Windows UPnP Device Host Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27916","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27916","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27916","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27916","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27916","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-27916 cve-2026-27916 windows upnp device host elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-27917","cve":"CVE-2026-27917","title":"Windows WFP NDIS Lightweight Filter Driver (wfplwfs.sys) Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27917","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27917","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27917","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27917","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27917","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-27917 cve-2026-27917 windows wfp ndis lightweight filter driver (wfplwfs.sys) elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-27918","cve":"CVE-2026-27918","title":"Windows Shell Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27918","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27918","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27918","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27918","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27918","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-27918 cve-2026-27918 windows shell elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-27919","cve":"CVE-2026-27919","title":"Windows UPnP Device Host Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27919","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27919","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27919","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27919","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27919","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-27919 cve-2026-27919 windows upnp device host elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-27920","cve":"CVE-2026-27920","title":"Windows UPnP Device Host Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27920","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27920","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27920","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27920","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27920","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-27920 cve-2026-27920 windows upnp device host elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-27921","cve":"CVE-2026-27921","title":"Windows TDI Translation Driver (tdx.sys) Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27921","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27921","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27921","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27921","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27921","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-27921 cve-2026-27921 windows tdi translation driver (tdx.sys) elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-27922","cve":"CVE-2026-27922","title":"Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27922","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27922","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27922","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27922","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27922","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-27922 cve-2026-27922 windows ancillary function driver for winsock elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-27923","cve":"CVE-2026-27923","title":"Desktop Window Manager Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27923","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27923","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27923","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27923","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27923","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-27923 cve-2026-27923 desktop window manager elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-27924","cve":"CVE-2026-27924","title":"Desktop Window Manager Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27924","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27924","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27924","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27924","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27924","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-27924 cve-2026-27924 desktop window manager elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-27925","cve":"CVE-2026-27925","title":"Windows UPnP Device Host Information Disclosure Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27925","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27925","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27925","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27925","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27925","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-27925 cve-2026-27925 windows upnp device host information disclosure vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-27926","cve":"CVE-2026-27926","title":"Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27926","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27926","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27926","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27926","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27926","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-27926 cve-2026-27926 windows cloud files mini filter driver elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-27927","cve":"CVE-2026-27927","title":"Windows Projected File System Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27927","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27927","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27927","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27927","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27927","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-27927 cve-2026-27927 windows projected file system elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-27928","cve":"CVE-2026-27928","title":"Windows Hello Security Feature Bypass Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27928","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27928","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27928","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.7,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27928","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27928","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-27928 cve-2026-27928 windows hello security feature bypass vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-27929","cve":"CVE-2026-27929","title":"Windows LUA File Virtualization Filter Driver Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27929","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27929","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27929","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27929","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27929","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-27929 cve-2026-27929 windows lua file virtualization filter driver elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-27930","cve":"CVE-2026-27930","title":"Windows GDI Information Disclosure Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27930","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27930","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27930","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27930","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27930","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-27930 cve-2026-27930 windows gdi information disclosure vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-27931","cve":"CVE-2026-27931","title":"Windows GDI Information Disclosure Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27931","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27931","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27931","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27931","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27931","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-27931 cve-2026-27931 windows gdi information disclosure vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-28387","cve":"CVE-2026-28387","title":"Potential Use-after-free in DANE Client Code","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-28387","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-28387","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-28387","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":3.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-28387","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-28387","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"low","search_text":"cve-2026-28387 cve-2026-28387 potential use-after-free in dane client code microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-28388","cve":"CVE-2026-28388","title":"NULL Pointer Dereference When Processing a Delta CRL","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-28388","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-28388","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-28388","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.9,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-28388","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-28388","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-28388 cve-2026-28388 null pointer dereference when processing a delta crl microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-28389","cve":"CVE-2026-28389","title":"Possible NULL Dereference When Processing CMS KeyAgreeRecipientInfo","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-28389","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-28389","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-28389","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-28389","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-28389","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-28389 cve-2026-28389 possible null dereference when processing cms keyagreerecipientinfo microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-28390","cve":"CVE-2026-28390","title":"Possible NULL Dereference When Processing CMS KeyTransportRecipientInfo","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-28390","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-28390","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-28390","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-28390","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-28390","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-28390 cve-2026-28390 possible null dereference when processing cms keytransportrecipientinfo microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-31408","cve":"CVE-2026-31408","title":"Bluetooth: SCO: Fix use-after-free in sco_recv_frame() due to missing sock_hold","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31408","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31408","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31408","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":"2026-04-06","cve_updated":"2026-04-13","published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31408","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31408","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-31408 cve-2026-31408 bluetooth: sco: fix use-after-free in sco_recv_frame() due to missing sock_hold microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14","source_url_repaired_from":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31408"},{"id":"CVE-2026-31410","cve":"CVE-2026-31410","title":"ksmbd: use volume UUID in FS_OBJECT_ID_INFORMATION","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31410","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31410","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31410","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":"2026-04-06","cve_updated":"2026-04-06","published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31410","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31410","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-31410 cve-2026-31410 ksmbd: use volume uuid in fs_object_id_information microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14","source_url_repaired_from":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31410"},{"id":"CVE-2026-31414","cve":"CVE-2026-31414","title":"netfilter: nf_conntrack_expect: use expect-&gt;helper","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31414","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31414","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31414","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.1,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31414","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31414","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-31414 cve-2026-31414 netfilter: nf_conntrack_expect: use expect-&gt;helper microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-31416","cve":"CVE-2026-31416","title":"netfilter: nfnetlink_log: account for netlink header size","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31416","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31416","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31416","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.1,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31416","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31416","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-31416 cve-2026-31416 netfilter: nfnetlink_log: account for netlink header size microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-31417","cve":"CVE-2026-31417","title":"net/x25: Fix overflow when accumulating packets","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31417","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31417","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31417","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.1,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31417","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31417","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-31417 cve-2026-31417 net/x25: fix overflow when accumulating packets microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-31418","cve":"CVE-2026-31418","title":"netfilter: ipset: drop logically empty buckets in mtype_del","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31418","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31418","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31418","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.1,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31418","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31418","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-31418 cve-2026-31418 netfilter: ipset: drop logically empty buckets in mtype_del microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-31419","cve":"CVE-2026-31419","title":"net: bonding: fix use-after-free in bond_xmit_broadcast()","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31419","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31419","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31419","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31419","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31419","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-31419 cve-2026-31419 net: bonding: fix use-after-free in bond_xmit_broadcast() microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-31420","cve":"CVE-2026-31420","title":"bridge: mrp: reject zero test interval to avoid OOM panic","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31420","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31420","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31420","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31420","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31420","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-31420 cve-2026-31420 bridge: mrp: reject zero test interval to avoid oom panic microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-31421","cve":"CVE-2026-31421","title":"net/sched: cls_fw: fix NULL pointer dereference on shared blocks","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31421","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31421","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31421","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31421","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31421","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-31421 cve-2026-31421 net/sched: cls_fw: fix null pointer dereference on shared blocks microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-31422","cve":"CVE-2026-31422","title":"net/sched: cls_flow: fix NULL pointer dereference on shared blocks","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31422","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31422","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31422","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31422","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31422","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-31422 cve-2026-31422 net/sched: cls_flow: fix null pointer dereference on shared blocks microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-31423","cve":"CVE-2026-31423","title":"net/sched: sch_hfsc: fix divide-by-zero in rtsc_min()","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31423","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31423","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31423","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31423","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31423","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-31423 cve-2026-31423 net/sched: sch_hfsc: fix divide-by-zero in rtsc_min() microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-31424","cve":"CVE-2026-31424","title":"netfilter: x_tables: restrict xt_check_match/xt_check_target extensions for NFPROTO_ARP","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31424","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31424","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31424","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31424","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31424","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-31424 cve-2026-31424 netfilter: x_tables: restrict xt_check_match/xt_check_target extensions for nfproto_arp microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-31426","cve":"CVE-2026-31426","title":"ACPI: EC: clean up handlers on probe failure in acpi_ec_setup()","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31426","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31426","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31426","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31426","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31426","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-31426 cve-2026-31426 acpi: ec: clean up handlers on probe failure in acpi_ec_setup() microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-31427","cve":"CVE-2026-31427","title":"netfilter: nf_conntrack_sip: fix use of uninitialized rtp_addr in process_sdp","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31427","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31427","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31427","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31427","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31427","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-31427 cve-2026-31427 netfilter: nf_conntrack_sip: fix use of uninitialized rtp_addr in process_sdp microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-31428","cve":"CVE-2026-31428","title":"netfilter: nfnetlink_log: fix uninitialized padding leak in NFULA_PAYLOAD","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31428","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31428","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31428","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31428","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31428","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-31428 cve-2026-31428 netfilter: nfnetlink_log: fix uninitialized padding leak in nfula_payload microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-31789","cve":"CVE-2026-31789","title":"Heap Buffer Overflow in Hexadecimal Conversion","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31789","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31789","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31789","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.7,"cve_published":"2026-04-07","cve_updated":"2026-04-09","published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31789","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31789","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-31789 cve-2026-31789 heap buffer overflow in hexadecimal conversion microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14","source_url_repaired_from":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31789"},{"id":"CVE-2026-31790","cve":"CVE-2026-31790","title":"Incorrect Failure Handling in RSA KEM RSASVE Encapsulation","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31790","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31790","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31790","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31790","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31790","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-31790 cve-2026-31790 incorrect failure handling in rsa kem rsasve encapsulation microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-3184","cve":"CVE-2026-3184","title":"Util-linux: util-linux: access control bypass due to improper hostname canonicalization","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-3184","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-3184","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-3184","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":3.7,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-3184","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-3184","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"low","search_text":"cve-2026-3184 cve-2026-3184 util-linux: util-linux: access control bypass due to improper hostname canonicalization microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32068","cve":"CVE-2026-32068","title":"Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32068","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32068","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32068","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32068","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32068","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32068 cve-2026-32068 windows simple search and discovery protocol (ssdp) service elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32069","cve":"CVE-2026-32069","title":"Windows Projected File System Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32069","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32069","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32069","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32069","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32069","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32069 cve-2026-32069 windows projected file system elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32070","cve":"CVE-2026-32070","title":"Windows Common Log File System Driver Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32070","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32070","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32070","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32070","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32070","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32070 cve-2026-32070 windows common log file system driver elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32071","cve":"CVE-2026-32071","title":"Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32071","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32071","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32071","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32071","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32071","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32071 cve-2026-32071 windows local security authority subsystem service (lsass) denial of service vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32072","cve":"CVE-2026-32072","title":"Active Directory Spoofing Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32072","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32072","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32072","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.2,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32072","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32072","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-32072 cve-2026-32072 active directory spoofing vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32073","cve":"CVE-2026-32073","title":"Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32073","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32073","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32073","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32073","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32073","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32073 cve-2026-32073 windows ancillary function driver for winsock elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32074","cve":"CVE-2026-32074","title":"Windows Projected File System Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32074","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32074","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32074","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32074","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32074","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32074 cve-2026-32074 windows projected file system elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32075","cve":"CVE-2026-32075","title":"Windows UPnP Device Host Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32075","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32075","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32075","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32075","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32075","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32075 cve-2026-32075 windows upnp device host elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32076","cve":"CVE-2026-32076","title":"Windows Storage Spaces Controller Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32076","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32076","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32076","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32076","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32076","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32076 cve-2026-32076 windows storage spaces controller elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32077","cve":"CVE-2026-32077","title":"Windows UPnP Device Host Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32077","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32077","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32077","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32077","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32077","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32077 cve-2026-32077 windows upnp device host elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32078","cve":"CVE-2026-32078","title":"Windows Projected File System Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32078","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32078","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32078","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32078","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32078","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32078 cve-2026-32078 windows projected file system elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32079","cve":"CVE-2026-32079","title":"Web Account Manager Information Disclosure Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32079","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32079","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32079","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32079","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32079","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-32079 cve-2026-32079 web account manager information disclosure vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32080","cve":"CVE-2026-32080","title":"Windows WalletService Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32080","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32080","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32080","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32080","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32080","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32080 cve-2026-32080 windows walletservice elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32081","cve":"CVE-2026-32081","title":"Package Catalog Information Disclosure Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32081","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32081","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32081","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32081","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32081","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-32081 cve-2026-32081 package catalog information disclosure vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32082","cve":"CVE-2026-32082","title":"Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32082","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32082","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32082","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32082","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32082","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32082 cve-2026-32082 windows simple search and discovery protocol (ssdp) service elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32083","cve":"CVE-2026-32083","title":"Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32083","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32083","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32083","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32083","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32083","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32083 cve-2026-32083 windows simple search and discovery protocol (ssdp) service elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32084","cve":"CVE-2026-32084","title":"Windows Print Spooler Information Disclosure Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32084","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32084","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32084","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32084","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32084","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-32084 cve-2026-32084 windows print spooler information disclosure vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32085","cve":"CVE-2026-32085","title":"Remote Procedure Call Information Disclosure Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32085","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32085","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32085","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32085","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32085","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-32085 cve-2026-32085 remote procedure call information disclosure vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32086","cve":"CVE-2026-32086","title":"Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32086","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32086","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32086","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32086","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32086","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32086 cve-2026-32086 windows function discovery service (fdwsd.dll) elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32087","cve":"CVE-2026-32087","title":"Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32087","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32087","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32087","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32087","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32087","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32087 cve-2026-32087 windows function discovery service (fdwsd.dll) elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32088","cve":"CVE-2026-32088","title":"Windows Biometric Service Security Feature Bypass Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32088","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32088","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32088","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.1,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32088","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32088","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-32088 cve-2026-32088 windows biometric service security feature bypass vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32089","cve":"CVE-2026-32089","title":"Windows Speech Brokered Api Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32089","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32089","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32089","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32089","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32089","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32089 cve-2026-32089 windows speech brokered api elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32090","cve":"CVE-2026-32090","title":"Windows Speech Brokered Api Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32090","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32090","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32090","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32090","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32090","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32090 cve-2026-32090 windows speech brokered api elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32091","cve":"CVE-2026-32091","title":"Microsoft Brokering File System Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32091","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32091","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32091","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.4,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32091","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32091","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32091 cve-2026-32091 microsoft brokering file system elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32093","cve":"CVE-2026-32093","title":"Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32093","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32093","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32093","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32093","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32093","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32093 cve-2026-32093 windows function discovery service (fdwsd.dll) elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32149","cve":"CVE-2026-32149","title":"Windows Hyper-V Remote Code Execution Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32149","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32149","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32149","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.3,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32149","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32149","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32149 cve-2026-32149 windows hyper-v remote code execution vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32150","cve":"CVE-2026-32150","title":"Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32150","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32150","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32150","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32150","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32150","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32150 cve-2026-32150 windows function discovery service (fdwsd.dll) elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32151","cve":"CVE-2026-32151","title":"Windows Shell Information Disclosure Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32151","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32151","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32151","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32151","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32151","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-32151 cve-2026-32151 windows shell information disclosure vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32152","cve":"CVE-2026-32152","title":"Desktop Window Manager Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32152","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32152","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32152","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32152","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32152","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32152 cve-2026-32152 desktop window manager elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32153","cve":"CVE-2026-32153","title":"Windows Speech Runtime Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32153","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32153","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32153","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32153","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32153","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32153 cve-2026-32153 windows speech runtime elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32154","cve":"CVE-2026-32154","title":"Desktop Window Manager Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32154","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32154","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32154","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32154","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32154","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32154 cve-2026-32154 desktop window manager elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32155","cve":"CVE-2026-32155","title":"Desktop Window Manager Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32155","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32155","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32155","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32155","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32155","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32155 cve-2026-32155 desktop window manager elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32156","cve":"CVE-2026-32156","title":"Windows UPnP Device Host Remote Code Execution Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32156","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32156","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32156","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.4,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32156","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32156","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32156 cve-2026-32156 windows upnp device host remote code execution vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32157","cve":"CVE-2026-32157","title":"Remote Desktop Client Remote Code Execution Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32157","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32157","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32157","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32157","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32157","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32157 cve-2026-32157 remote desktop client remote code execution vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32158","cve":"CVE-2026-32158","title":"Windows Push Notifications Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32158","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32158","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32158","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32158","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32158","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32158 cve-2026-32158 windows push notifications elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32159","cve":"CVE-2026-32159","title":"Windows Push Notifications Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32159","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32159","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32159","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32159","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32159","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32159 cve-2026-32159 windows push notifications elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32160","cve":"CVE-2026-32160","title":"Windows Push Notifications Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32160","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32160","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32160","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32160","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32160","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32160 cve-2026-32160 windows push notifications elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32162","cve":"CVE-2026-32162","title":"Windows COM Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32162","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32162","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32162","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.4,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32162","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32162","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32162 cve-2026-32162 windows com elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32163","cve":"CVE-2026-32163","title":"Windows User Interface Core Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32163","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32163","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32163","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32163","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32163","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32163 cve-2026-32163 windows user interface core elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32164","cve":"CVE-2026-32164","title":"Windows User Interface Core Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32164","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32164","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32164","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32164","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32164","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32164 cve-2026-32164 windows user interface core elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32165","cve":"CVE-2026-32165","title":"Windows User Interface Core Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32165","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32165","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32165","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32165","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32165","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32165 cve-2026-32165 windows user interface core elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32167","cve":"CVE-2026-32167","title":"SQL Server Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32167","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32167","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32167","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.7,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32167","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32167","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-32167 cve-2026-32167 sql server elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32168","cve":"CVE-2026-32168","title":"Azure Monitor Agent Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32168","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32168","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32168","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32168","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32168","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32168 cve-2026-32168 azure monitor agent elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32171","cve":"CVE-2026-32171","title":"Azure Logic Apps Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32171","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32171","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32171","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32171","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32171","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32171 cve-2026-32171 azure logic apps elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32176","cve":"CVE-2026-32176","title":"SQL Server Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32176","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32176","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32176","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.7,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32176","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32176","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-32176 cve-2026-32176 sql server elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32178","cve":"CVE-2026-32178","title":".NET Spoofing Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32178","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32178","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32178","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32178","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32178","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32178 cve-2026-32178 .net spoofing vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32181","cve":"CVE-2026-32181","title":"Connected User Experiences and Telemetry Service Denial of Service Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32181","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32181","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32181","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32181","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32181","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-32181 cve-2026-32181 connected user experiences and telemetry service denial of service vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32183","cve":"CVE-2026-32183","title":"Windows Snipping Tool Remote Code Execution Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32183","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32183","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32183","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32183","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32183","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32183 cve-2026-32183 windows snipping tool remote code execution vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32184","cve":"CVE-2026-32184","title":"Microsoft High Performance Compute (HPC) Pack Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32184","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32184","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32184","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32184","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32184","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32184 cve-2026-32184 microsoft high performance compute (hpc) pack elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32188","cve":"CVE-2026-32188","title":"Microsoft Excel Information Disclosure Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32188","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32188","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32188","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32188","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32188","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32188 cve-2026-32188 microsoft excel information disclosure vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32189","cve":"CVE-2026-32189","title":"Microsoft Excel Remote Code Execution Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32189","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32189","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32189","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32189","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32189","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32189 cve-2026-32189 microsoft excel remote code execution vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32190","cve":"CVE-2026-32190","title":"Microsoft Office Remote Code Execution Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32190","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32190","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32190","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.4,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32190","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32190","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32190 cve-2026-32190 microsoft office remote code execution vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32192","cve":"CVE-2026-32192","title":"Azure Monitor Agent Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32192","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32192","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32192","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32192","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32192","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32192 cve-2026-32192 azure monitor agent elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32195","cve":"CVE-2026-32195","title":"Windows Kernel Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32195","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32195","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32195","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32195","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32195","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32195 cve-2026-32195 windows kernel elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32196","cve":"CVE-2026-32196","title":"Windows Admin Center Spoofing Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32196","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32196","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32196","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.1,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32196","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32196","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-32196 cve-2026-32196 windows admin center spoofing vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32197","cve":"CVE-2026-32197","title":"Microsoft Excel Remote Code Execution Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32197","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32197","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32197","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32197","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32197","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32197 cve-2026-32197 microsoft excel remote code execution vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32198","cve":"CVE-2026-32198","title":"Microsoft Excel Remote Code Execution Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32198","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32198","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32198","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32198","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32198","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32198 cve-2026-32198 microsoft excel remote code execution vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32199","cve":"CVE-2026-32199","title":"Microsoft Excel Remote Code Execution Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32199","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32199","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32199","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32199","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32199","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32199 cve-2026-32199 microsoft excel remote code execution vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32202","cve":"CVE-2026-32202","title":"Windows Shell Spoofing Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32202","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32202","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32202","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.3,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32202","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32202","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-32202 cve-2026-32202 windows shell spoofing vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32212","cve":"CVE-2026-32212","title":"Universal Plug and Play (upnp.dll) Information Disclosure Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32212","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32212","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32212","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32212","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32212","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-32212 cve-2026-32212 universal plug and play (upnp.dll) information disclosure vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32215","cve":"CVE-2026-32215","title":"Windows Kernel Information Disclosure Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32215","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32215","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32215","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32215","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32215","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-32215 cve-2026-32215 windows kernel information disclosure vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32216","cve":"CVE-2026-32216","title":"Windows Redirected Drive Buffering System Denial of Service Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32216","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32216","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32216","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32216","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32216","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-32216 cve-2026-32216 windows redirected drive buffering system denial of service vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32217","cve":"CVE-2026-32217","title":"Windows Kernel Information Disclosure Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32217","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32217","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32217","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32217","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32217","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-32217 cve-2026-32217 windows kernel information disclosure vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32218","cve":"CVE-2026-32218","title":"Windows Kernel Information Disclosure Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32218","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32218","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32218","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32218","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32218","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-32218 cve-2026-32218 windows kernel information disclosure vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32219","cve":"CVE-2026-32219","title":"Microsoft Brokering File System Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32219","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32219","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32219","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32219","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32219","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32219 cve-2026-32219 microsoft brokering file system elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32220","cve":"CVE-2026-32220","title":"UEFI Secure Boot Security Feature Bypass Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32220","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32220","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32220","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.4,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32220","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32220","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-32220 cve-2026-32220 uefi secure boot security feature bypass vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32221","cve":"CVE-2026-32221","title":"Windows Graphics Component Remote Code Execution Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32221","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32221","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32221","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.4,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32221","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32221","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32221 cve-2026-32221 windows graphics component remote code execution vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32222","cve":"CVE-2026-32222","title":"Windows Win32k Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32222","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32222","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32222","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32222","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32222","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32222 cve-2026-32222 windows win32k elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32223","cve":"CVE-2026-32223","title":"Windows USB Printing Stack (usbprint.sys) Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32223","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32223","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32223","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32223","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32223","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-32223 cve-2026-32223 windows usb printing stack (usbprint.sys) elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32224","cve":"CVE-2026-32224","title":"Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32224","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32224","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32224","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32224","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32224","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32224 cve-2026-32224 windows server update service (wsus) elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32226","cve":"CVE-2026-32226","title":".NET Framework Denial of Service Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32226","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32226","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32226","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.9,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32226","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32226","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-32226 cve-2026-32226 .net framework denial of service vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32280","cve":"CVE-2026-32280","title":"Unexpected work during chain building in crypto/x509","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32280","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32280","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32280","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32280","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32280","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32280 cve-2026-32280 unexpected work during chain building in crypto/x509 microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32281","cve":"CVE-2026-32281","title":"Inefficient policy validation in crypto/x509","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32281","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32281","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32281","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.9,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32281","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32281","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-32281 cve-2026-32281 inefficient policy validation in crypto/x509 microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32282","cve":"CVE-2026-32282","title":"TOCTOU permits root escape on Linux via Root.Chmod in os in internal/syscall/unix","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32282","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32282","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32282","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.3,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32282","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32282","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-32282 cve-2026-32282 toctou permits root escape on linux via root.chmod in os in internal/syscall/unix microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32283","cve":"CVE-2026-32283","title":"Unauthenticated TLS 1.3 KeyUpdate record can cause persistent connection retention and DoS in crypto/tls","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32283","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32283","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32283","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.9,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32283","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32283","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-32283 cve-2026-32283 unauthenticated tls 1.3 keyupdate record can cause persistent connection retention and dos in crypto/tls microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32288","cve":"CVE-2026-32288","title":"Unbounded allocation for old GNU sparse in archive/tar","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32288","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32288","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32288","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32288","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32288","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-32288 cve-2026-32288 unbounded allocation for old gnu sparse in archive/tar microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32289","cve":"CVE-2026-32289","title":"JsBraceDepth Context Tracking Bugs (XSS) in html/template","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32289","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32289","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32289","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.1,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32289","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32289","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-32289 cve-2026-32289 jsbracedepth context tracking bugs (xss) in html/template microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-32631","cve":"CVE-2026-32631","title":"GitHub: CVE-2026-32631 'git clone' from manipulated repositories can leak NTLM hashes","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32631","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32631","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32631","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.4,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32631","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32631","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32631 cve-2026-32631 github: cve-2026-32631 'git clone' from manipulated repositories can leak ntlm hashes microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-33095","cve":"CVE-2026-33095","title":"Microsoft Word Remote Code Execution Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33095","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33095","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33095","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33095","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33095","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-33095 cve-2026-33095 microsoft word remote code execution vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-33096","cve":"CVE-2026-33096","title":"HTTP.sys Denial of Service Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33096","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33096","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33096","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33096","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33096","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-33096 cve-2026-33096 http.sys denial of service vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-33098","cve":"CVE-2026-33098","title":"Windows Container Isolation FS Filter Driver Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33098","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33098","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33098","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33098","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33098","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-33098 cve-2026-33098 windows container isolation fs filter driver elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-33116","cve":"CVE-2026-33116","title":".NET, .NET Framework, and Visual Studio Denial of Service Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33116","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33116","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33116","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33116","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33116","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-33116 cve-2026-33116 .net, .net framework, and visual studio denial of service vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-33120","cve":"CVE-2026-33120","title":"Microsoft SQL Server Remote Code Execution Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33120","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33120","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33120","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33120","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33120","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-33120 cve-2026-33120 microsoft sql server remote code execution vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-33555","cve":"CVE-2026-33555","title":"Mariner","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33555","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33555","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33555","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33555","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33555","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-33555 cve-2026-33555 mariner microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-33810","cve":"CVE-2026-33810","title":"Case-sensitive excludedSubtrees name constraints cause Auth Bypass in crypto/x509","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33810","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33810","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33810","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.9,"cve_published":"2026-04-08","cve_updated":"2026-04-08","published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33810","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33810","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-33810 cve-2026-33810 case-sensitive excludedsubtrees name constraints cause auth bypass in crypto/x509 microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14","source_url_repaired_from":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33810"},{"id":"CVE-2026-33822","cve":"CVE-2026-33822","title":"Microsoft Word Information Disclosure Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33822","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33822","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33822","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.1,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33822","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33822","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-33822 cve-2026-33822 microsoft word information disclosure vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-33825","cve":"CVE-2026-33825","title":"Microsoft Defender Elevation of Privilege Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":null,"published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33825","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33825","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33825","published":"2026-04-14","updated":"2026-04-14","checked_at":"2026-04-16T06:01:10.312Z","status_ok":true,"source_kind":"vendor","confidence":0.92}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":"2026-04-16T06:01:10.312Z","sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33825","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33825","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-33825 cve-2026-33825 microsoft defender elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-33826","cve":"CVE-2026-33826","title":"Windows Active Directory Remote Code Execution Vulnerability","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":null,"published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33826","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33826","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33826","published":"2026-04-14","updated":"2026-04-14","checked_at":"2026-04-16T06:01:10.606Z","status_ok":true,"source_kind":"vendor","confidence":0.92}],"exploited":false,"severity":"high","cvss":8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":"2026-04-16T06:01:10.606Z","sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33826","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33826","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-33826 cve-2026-33826 windows active directory remote code execution vulnerability microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-34445","cve":"CVE-2026-34445","title":"ONNX: Malicious ONNX models can crash servers by exploiting unprotected object settings.","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34445","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34445","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34445","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.6,"cve_published":"2026-04-01","cve_updated":"2026-04-01","published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34445","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34445","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-34445 cve-2026-34445 onnx: malicious onnx models can crash servers by exploiting unprotected object settings. microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14","source_url_repaired_from":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34445"},{"id":"CVE-2026-34446","cve":"CVE-2026-34446","title":"ONNX: Arbitrary File Read via ExternalData Hardlink Bypass in ONNX load","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34446","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34446","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34446","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.7,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34446","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34446","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-34446 cve-2026-34446 onnx: arbitrary file read via externaldata hardlink bypass in onnx load microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-34601","cve":"CVE-2026-34601","title":"xmldom: XML injection via unsafe CDATA serialization allows attacker-controlled markup insertion","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34601","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34601","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34601","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":"2026-04-02","cve_updated":"2026-04-03","published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34601","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34601","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-34601 cve-2026-34601 xmldom: xml injection via unsafe cdata serialization allows attacker-controlled markup insertion microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14","source_url_repaired_from":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34601"},{"id":"CVE-2026-34757","cve":"CVE-2026-34757","title":"LIBPNG has a yse-after-free in png_set_PLTE, png_set_tRNS and png_set_hIST leading to corrupted chunk data and potential heap information disclosure","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34757","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34757","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34757","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.1,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34757","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34757","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-34757 cve-2026-34757 libpng has a yse-after-free in png_set_plte, png_set_trns and png_set_hist leading to corrupted chunk data and potential heap information disclosure microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-34933","cve":"CVE-2026-34933","title":"Avahi: Reachable assertion in `transport_flags_from_domain()` via conflicting publish flags crashes avahi-daemon","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34933","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34933","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34933","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":"2026-04-03","cve_updated":"2026-04-06","published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"source_url_repaired_from":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34933","sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34933","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34933","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-34933 cve-2026-34933 avahi: reachable assertion in `transport_flags_from_domain()` via conflicting publish flags crashes avahi-daemon microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-34979","cve":"CVE-2026-34979","title":"OpenPrinting CUPS: Heap overflow in `get_options()`","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34979","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34979","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34979","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.3,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34979","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34979","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-34979 cve-2026-34979 openprinting cups: heap overflow in `get_options()` microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-34982","cve":"CVE-2026-34982","title":"Vim modeline bypass via various options affects Vim &lt; 9.2.0276","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34982","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34982","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34982","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.2,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34982","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34982","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-34982 cve-2026-34982 vim modeline bypass via various options affects vim &lt; 9.2.0276 microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-35093","cve":"CVE-2026-35093","title":"Libinput: libinput: unauthorized code execution and information disclosure through lua bytecode plugins","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35093","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35093","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35093","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":"2026-04-01","cve_updated":"2026-04-03","published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35093","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35093","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-35093 cve-2026-35093 libinput: libinput: unauthorized code execution and information disclosure through lua bytecode plugins microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14","source_url_repaired_from":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35093"},{"id":"CVE-2026-35177","cve":"CVE-2026-35177","title":"Path traversal issue with zip.vim in Vim","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35177","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35177","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35177","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.1,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35177","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35177","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-35177 cve-2026-35177 path traversal issue with zip.vim in vim microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-35201","cve":"CVE-2026-35201","title":"Discount has an Out-of-bounds Read in rdiscount","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35201","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35201","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35201","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.9,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35201","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35201","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-35201 cve-2026-35201 discount has an out-of-bounds read in rdiscount microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-35385","cve":"CVE-2026-35385","title":"Mariner","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35385","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35385","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35385","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":"2026-04-02","cve_updated":"2026-04-03","published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35385","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35385","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-35385 cve-2026-35385 mariner microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14","source_url_repaired_from":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35385"},{"id":"CVE-2026-35387","cve":"CVE-2026-35387","title":"Mariner","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35387","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35387","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35387","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":3.1,"cve_published":"2026-04-02","cve_updated":"2026-04-03","published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35387","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35387","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"low","search_text":"cve-2026-35387 cve-2026-35387 mariner microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14","source_url_repaired_from":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35387"},{"id":"CVE-2026-35388","cve":"CVE-2026-35388","title":"Mariner","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35388","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35388","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35388","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":2.5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35388","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35388","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"low","search_text":"cve-2026-35388 cve-2026-35388 mariner microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-35535","cve":"CVE-2026-35535","title":"Mariner","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35535","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35535","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35535","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.4,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35535","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35535","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-35535 cve-2026-35535 mariner microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-35549","cve":"CVE-2026-35549","title":"Mariner","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35549","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35549","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35549","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35549","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35549","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-35549 cve-2026-35549 mariner microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-35611","cve":"CVE-2026-35611","title":"Addressable has a Regular Expression Denial of Service in Addressable templates","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35611","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35611","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35611","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35611","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35611","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-35611 cve-2026-35611 addressable has a regular expression denial of service in addressable templates microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-39314","cve":"CVE-2026-39314","title":"CUPS has an integer underflow in `_ppdCreateFromIPP` causes root cupsd crash via negative `job-password-supported`","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39314","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39314","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39314","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4,"cve_published":"2026-04-07","cve_updated":"2026-04-07","published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39314","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39314","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-39314 cve-2026-39314 cups has an integer underflow in `_ppdcreatefromipp` causes root cupsd crash via negative `job-password-supported` microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14","source_url_repaired_from":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39314"},{"id":"CVE-2026-39316","cve":"CVE-2026-39316","title":"CUPS has a use-after-free in `cupsdDeleteTemporaryPrinters` via dangling subscription pointer","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39316","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39316","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39316","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4,"cve_published":"2026-04-07","cve_updated":"2026-04-09","published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39316","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39316","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-39316 cve-2026-39316 cups has a use-after-free in `cupsddeletetemporaryprinters` via dangling subscription pointer microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14","source_url_repaired_from":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39316"},{"id":"CVE-2026-39853","cve":"CVE-2026-39853","title":"osslsigncode has a Stack Buffer Overflow via Unbounded Digest Copy During Signature Verification","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39853","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39853","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39853","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39853","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39853","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-39853 cve-2026-39853 osslsigncode has a stack buffer overflow via unbounded digest copy during signature verification microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-39855","cve":"CVE-2026-39855","title":"osslsigncode has an Integer Underflow in PE Page Hash Calculation Can Cause Out-of-Bounds Read","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39855","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39855","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39855","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39855","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39855","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-39855 cve-2026-39855 osslsigncode has an integer underflow in pe page hash calculation can cause out-of-bounds read microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-39856","cve":"CVE-2026-39856","title":"osslsigncode has an Out-of-Bounds Read via Unvalidated Section Bounds in PE Page Hash Calculation","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39856","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39856","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39856","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39856","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39856","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-39856 cve-2026-39856 osslsigncode has an out-of-bounds read via unvalidated section bounds in pe page hash calculation microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-39881","cve":"CVE-2026-39881","title":"Vim Ex command injection in Vims NetBeans integration","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39881","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39881","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39881","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39881","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39881","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-39881 cve-2026-39881 vim ex command injection in vims netbeans integration microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-39882","cve":"CVE-2026-39882","title":"OpenTelemetry-Go OTLP HTTP exporters read unbounded HTTP response bodies","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39882","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39882","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39882","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.3,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39882","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39882","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-39882 cve-2026-39882 opentelemetry-go otlp http exporters read unbounded http response bodies microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-40024","cve":"CVE-2026-40024","title":"Sleuth Kit tsk_recover Path Traversal","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40024","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40024","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40024","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40024","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40024","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-40024 cve-2026-40024 sleuth kit tsk_recover path traversal microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-40025","cve":"CVE-2026-40025","title":"Sleuth Kit APFS Keybag Parser Out-of-Bounds Read","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40025","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40025","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40025","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.4,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40025","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40025","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-40025 cve-2026-40025 sleuth kit apfs keybag parser out-of-bounds read microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-40026","cve":"CVE-2026-40026","title":"Sleuth Kit ISO9660 SUSP Extension Reference Out-of-Bounds Read","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40026","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40026","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40026","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.4,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40026","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40026","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-40026 cve-2026-40026 sleuth kit iso9660 susp extension reference out-of-bounds read microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-40175","cve":"CVE-2026-40175","title":"Axios has Unrestricted Cloud Metadata Exfiltration via Header Injection Chain","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40175","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40175","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40175","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":10,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40175","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40175","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"critical","search_text":"cve-2026-40175 cve-2026-40175 axios has unrestricted cloud metadata exfiltration via header injection chain microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-40226","cve":"CVE-2026-40226","title":"Mariner","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40226","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40226","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40226","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.4,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40226","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40226","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-40226 cve-2026-40226 mariner microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-40385","cve":"CVE-2026-40385","title":"Mariner","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40385","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40385","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40385","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40385","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40385","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-40385 cve-2026-40385 mariner microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-40386","cve":"CVE-2026-40386","title":"Mariner","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40386","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40386","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40386","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40386","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40386","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-40386 cve-2026-40386 mariner microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-40393","cve":"CVE-2026-40393","title":"Mariner","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40393","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40393","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40393","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.1,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40393","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40393","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-40393 cve-2026-40393 mariner microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE-2026-4878","cve":"CVE-2026-4878","title":"Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-14","date":"2026-04-14","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-4878","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-4878","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-4878","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.7,"cve_published":null,"cve_updated":null,"published_at":"2026-04-14","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-4878","added":"2026-04-14T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-4878","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-4878 cve-2026-4878 libcap: libcap: privilege escalation via toctou race condition in cap_set_file() microsoft msrc msrc","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE:CVE-2009-0238","cve":"CVE-2009-0238","title":"Microsoft Office Remote Code Execution","date":"2026-04-14","vendor":"Microsoft","product":"Office","source":"CISA-KEV","cisa_url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog","source_url":"https://nvd.nist.gov/vuln/detail/CVE-2009-0238","severity":"high","ransomware":"Unknown","cvss":null,"exploited":true,"published":"2026-04-14","updated":null,"source_published":"2026-04-14","source_updated":null,"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"candidates":[{"url":"https://nvd.nist.gov/vuln/detail/CVE-2009-0238","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"nvd","confidence":0.8}],"date_basis":"nvd","link_checked_at":null,"sourceUrl":"https://nvd.nist.gov/vuln/detail/CVE-2009-0238","added":"2026-04-14T00:00:00.000Z","public_url":"https://nvd.nist.gov/vuln/detail/CVE-2009-0238","public_source":"CVE","public_source_slug":"cve","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve:cve-2009-0238 cve-2009-0238 microsoft office remote code execution microsoft office cve cisa-kev unknown","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"CVE:CVE-2026-32201","cve":"CVE-2026-32201","title":"Microsoft SharePoint Server Improper Input Validation Vulnerability","date":"2026-04-14","vendor":"Microsoft","product":"SharePoint Server","source":"CISA-KEV","cisa_url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog","source_url":"https://nvd.nist.gov/vuln/detail/CVE-2026-32201","severity":"high","ransomware":"Unknown","cvss":null,"exploited":true,"published":"2026-04-14","updated":null,"source_published":"2026-04-14","source_updated":null,"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"candidates":[{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-32201","published":"2026-04-14","updated":"2026-04-14","checked_at":null,"status_ok":null,"source_kind":"nvd","confidence":0.8}],"date_basis":"nvd","link_checked_at":null,"sourceUrl":"https://nvd.nist.gov/vuln/detail/CVE-2026-32201","added":"2026-04-14T00:00:00.000Z","public_url":"https://nvd.nist.gov/vuln/detail/CVE-2026-32201","public_source":"CVE","public_source_slug":"cve","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve:cve-2026-32201 cve-2026-32201 microsoft sharepoint server improper input validation vulnerability microsoft sharepoint server cve cisa-kev unknown","public_published":"2026-04-14","public_updated":null,"public_display_date":"2026-04-14","public_sort_date":"2026-04-14","public_period_date":"2026-04-14"},{"id":"BSI:WID-SEC-2026-0309","cve":"","title":"NGINX OSS und NGINX Plus: Schwachstelle ermöglicht Manipulation von Dateien","date":"2026-04-13","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0309","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-14T09:00:56.117Z","published":"2026-04-13","source_published":"2026-04-13","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0309","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-03-25","source_doc_updated":"2026-03-25","cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0309","added":"2026-04-13T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0309","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0309 nginx oss und nginx plus: schwachstelle ermöglicht manipulation von dateien bsi bsi"},{"id":"BSI:WID-SEC-2026-0472","cve":"","title":"OpenClaw: Mehrere Schwachstellen","date":"2026-04-13","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0472","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-13T09:01:31.367Z","published":"2026-04-13","source_published":"2026-04-13","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0472","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0472","added":"2026-04-13T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0472","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0472 openclaw: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0525","cve":"","title":"GStreamer: Mehrere Schwachstellen","date":"2026-04-13","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0525","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-14T09:00:56.117Z","published":"2026-04-13","source_published":"2026-04-13","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0525","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0525","added":"2026-04-13T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0525","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0525 gstreamer: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0542","cve":"","title":"OpenClaw: Mehrere Schwachstellen","date":"2026-04-13","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0542","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-13T09:01:31.367Z","published":"2026-04-13","source_published":"2026-04-13","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0542","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0542","added":"2026-04-13T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0542","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0542 openclaw: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0720","cve":"","title":"systemd: Mehrere Schwachstellen","date":"2026-04-13","published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0720","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0720","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-13T09:01:31.367Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0720","added":"2026-04-13T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0720","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0720 systemd: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0775","cve":"","title":"nghttp2: Schwachstelle ermöglicht Denial of Service","date":"2026-04-13","published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0775","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0775","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-14T09:00:56.117Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0775","added":"2026-04-13T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0775","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0775 nghttp2: schwachstelle ermöglicht denial of service bsi bsi"},{"id":"BSI:WID-SEC-2026-0817","cve":"","title":"GNU libc: Mehrere Schwachstellen ermöglichen Manipulation von DNS Antworten","date":"2026-04-13","published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0817","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0817","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-14T06:35:46.698Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0817","added":"2026-04-13T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0817","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0817 gnu libc: mehrere schwachstellen ermöglichen manipulation von dns antworten bsi bsi"},{"id":"BSI:WID-SEC-2026-0831","cve":"","title":"systemd: Mehrere Schwachstellen","date":"2026-04-13","published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0831","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0831","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-13T09:01:31.367Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0831","added":"2026-04-13T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0831","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0831 systemd: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0843","cve":"","title":"Node.js: Mehrere Schwachstellen","date":"2026-04-13","published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0843","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0843","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-14T06:35:46.698Z","source_doc_published":"2026-03-25","source_doc_updated":"2026-03-25","cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0843","added":"2026-04-13T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0843","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0843 node.js: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0856","cve":"","title":"OpenClaw: Mehrere Schwachstellen","date":"2026-04-13","published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0856","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0856","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-13T09:01:31.367Z","source_doc_published":"2026-03-25","source_doc_updated":"2026-03-25","cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0856","added":"2026-04-13T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0856","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0856 openclaw: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0860","cve":"","title":"NGINX und NGINX Plus: Mehrere Schwachstellen","date":"2026-04-13","published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0860","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0860","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-14T09:00:56.117Z","source_doc_published":"2026-03-25","source_doc_updated":"2026-03-25","cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0860","added":"2026-04-13T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0860","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0860 nginx und nginx plus: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0884","cve":"","title":"OpenClaw: Mehrere Schwachstellen","date":"2026-04-13","published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0884","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0884","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-13T09:01:31.367Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0884","added":"2026-04-13T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0884","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0884 openclaw: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0887","cve":"","title":"Internet Systems Consortium Kea: Schwachstelle ermöglicht Denial of Service","date":"2026-04-13","published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0887","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0887","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-14T09:00:56.117Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0887","added":"2026-04-13T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0887","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0887 internet systems consortium kea: schwachstelle ermöglicht denial of service bsi bsi"},{"id":"BSI:WID-SEC-2026-0888","cve":"","title":"tigervnc: Schwachstelle ermöglicht Offenlegung von Informationen, Manipulation von Dateien, und Denial of Service","date":"2026-04-13","published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0888","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0888","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-14T09:00:56.117Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0888","added":"2026-04-13T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0888","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0888 tigervnc: schwachstelle ermöglicht offenlegung von informationen, manipulation von dateien, und denial of service bsi bsi"},{"id":"BSI:WID-SEC-2026-0909","cve":"","title":"Tinyproxy: Schwachstelle ermöglicht Denial of Service","date":"2026-04-13","published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0909","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0909","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-14T09:00:56.117Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0909","added":"2026-04-13T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0909","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0909 tinyproxy: schwachstelle ermöglicht denial of service bsi bsi"},{"id":"BSI:WID-SEC-2026-0927","cve":"","title":"NoMachine: Mehrere Schwachstellen","date":"2026-04-13","published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0927","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0927","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-14T09:00:56.117Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0927","added":"2026-04-13T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0927","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0927 nomachine: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0933","cve":"","title":"IBM App Connect Enterprise (Hono und Undici): Mehrere Schwachstellen","date":"2026-04-13","published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0933","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0933","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-14T09:00:56.117Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0933","added":"2026-04-13T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0933","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0933 ibm app connect enterprise (hono und undici): mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0946","cve":"","title":"MediaWiki: Mehrere Schwachstellen","date":"2026-04-13","published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0946","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0946","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-14T09:00:56.117Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0946","added":"2026-04-13T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0946","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0946 mediawiki: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0966","cve":"","title":"Red Hat Enterprise Linux (crun): Schwachstelle ermöglicht Privilegieneskalation","date":"2026-04-13","published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0966","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0966","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-14T09:00:56.117Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0966","added":"2026-04-13T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0966","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-0966 red hat enterprise linux (crun): schwachstelle ermöglicht privilegieneskalation bsi bsi","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13"},{"id":"BSI:WID-SEC-2026-0967","cve":"","title":"Red Hat Enterprise Linux (fontforge): Schwachstelle ermöglicht Codeausführung","date":"2026-04-13","published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0967","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0967","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-14T09:00:56.117Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0967","added":"2026-04-13T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0967","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-0967 red hat enterprise linux (fontforge): schwachstelle ermöglicht codeausführung bsi bsi","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13"},{"id":"BSI:WID-SEC-2026-0971","cve":"","title":"sudo: Schwachstelle ermöglicht Privilegieneskalation","date":"2026-04-13","published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0971","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0971","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-14T09:00:56.117Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0971","added":"2026-04-13T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0971","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-0971 sudo: schwachstelle ermöglicht privilegieneskalation bsi bsi","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13"},{"id":"BSI:WID-SEC-2026-0974","cve":"","title":"Samsung Android: Mehrere Schwachstellen","date":"2026-04-13","published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0974","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0974","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-14T09:00:56.117Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0974","added":"2026-04-13T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0974","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-0974 samsung android: mehrere schwachstellen bsi bsi","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13"},{"id":"BSI:WID-SEC-2026-0999","cve":"","title":"Tinyproxy: Schwachstelle ermöglicht Denial of Service","date":"2026-04-13","published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0999","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0999","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-14T09:00:56.117Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0999","added":"2026-04-13T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0999","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-0999 tinyproxy: schwachstelle ermöglicht denial of service bsi bsi","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13"},{"id":"BSI:WID-SEC-2026-1002","cve":"","title":"Django: Mehrere Schwachstellen","date":"2026-04-13","published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1002","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1002","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-14T09:00:56.117Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1002","added":"2026-04-13T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1002","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1002 django: mehrere schwachstellen bsi bsi","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13"},{"id":"BSI:WID-SEC-2026-1017","cve":"","title":"Palo Alto Networks Cortex XSOAR (Microsoft Teams Marketplace): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen","date":"2026-04-13","published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1017","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1017","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-14T09:00:56.117Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1017","added":"2026-04-13T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1017","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1017 palo alto networks cortex xsoar (microsoft teams marketplace): schwachstelle ermöglicht umgehen von sicherheitsvorkehrungen bsi bsi","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13"},{"id":"BSI:WID-SEC-2026-1019","cve":"","title":"Palo Alto Networks Cortex XDR Agent: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen","date":"2026-04-13","published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1019","severity":"low","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1019","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-14T09:00:56.117Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1019","added":"2026-04-13T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1019","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"low","search_text":"bsi:wid-sec-2026-1019 palo alto networks cortex xdr agent: schwachstelle ermöglicht umgehen von sicherheitsvorkehrungen bsi bsi","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13"},{"id":"BSI:WID-SEC-2026-1030","cve":"","title":"Google Chrome und Microsoft Edge: Mehrere Schwachstellen","date":"2026-04-13","published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1030","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1030","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-14T09:00:56.117Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1030","added":"2026-04-13T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1030","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1030 google chrome und microsoft edge: mehrere schwachstellen bsi bsi","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13"},{"id":"BSI:WID-SEC-2026-1040","cve":"","title":"Apache ActiveMQ: Mehrere Schwachstellen","date":"2026-04-13","published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1040","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1040","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-14T09:00:56.117Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1040","added":"2026-04-13T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1040","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1040 apache activemq: mehrere schwachstellen bsi bsi","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13"},{"id":"BSI:WID-SEC-2026-1041","cve":"","title":"VMware Tanzu Spring Cloud Gateway: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen","date":"2026-04-13","published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1041","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1041","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-14T09:00:56.117Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1041","added":"2026-04-13T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1041","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1041 vmware tanzu spring cloud gateway: schwachstelle ermöglicht umgehen von sicherheitsvorkehrungen bsi bsi","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13"},{"id":"BSI:WID-SEC-2026-1047","cve":"","title":"Adobe Acrobat Reader: Schwachstelle ermöglicht Offenlegung von Informationen und Codeausführung","date":"2026-04-13","published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1047","severity":"critical","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1047","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-13T09:01:31.367Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1047","added":"2026-04-13T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1047","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"critical","search_text":"bsi:wid-sec-2026-1047 adobe acrobat reader: schwachstelle ermöglicht offenlegung von informationen und codeausführung bsi bsi","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13"},{"id":"BSI:WID-SEC-2026-1051","cve":"","title":"Kubernetes: Schwachstelle ermöglicht Manipulation von Dateien","date":"2026-04-13","published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1051","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1051","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-14T09:00:56.117Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1051","added":"2026-04-13T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1051","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1051 kubernetes: schwachstelle ermöglicht manipulation von dateien bsi bsi","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13"},{"id":"BSI:WID-SEC-2026-1053","cve":"","title":"Red Hat Enterprise Linux (openexr): Schwachstelle ermöglicht Codeausführung und Dos","date":"2026-04-13","published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1053","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1053","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-14T09:00:56.117Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1053","added":"2026-04-13T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1053","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1053 red hat enterprise linux (openexr): schwachstelle ermöglicht codeausführung und dos bsi bsi","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13"},{"id":"BSI:WID-SEC-2026-1056","cve":"","title":"Red Hat OpenShift AI: Schwachstelle ermöglicht Offenlegung von Informationen und Privilegieneskalation","date":"2026-04-13","published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1056","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1056","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-14T09:00:56.117Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1056","added":"2026-04-13T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1056","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1056 red hat openshift ai: schwachstelle ermöglicht offenlegung von informationen und privilegieneskalation bsi bsi","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13"},{"id":"BSI:WID-SEC-2026-1057","cve":"","title":"GNU tar: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen","date":"2026-04-13","published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1057","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1057","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-14T09:00:56.117Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1057","added":"2026-04-13T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1057","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1057 gnu tar: schwachstelle ermöglicht umgehen von sicherheitsvorkehrungen bsi bsi","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13"},{"id":"BSI:WID-SEC-2026-1058","cve":"","title":"IBM App Connect Enterprise: Schwachstelle ermöglicht Denial of Service","date":"2026-04-13","published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1058","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1058","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-14T09:00:56.117Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1058","added":"2026-04-13T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1058","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1058 ibm app connect enterprise: schwachstelle ermöglicht denial of service bsi bsi","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13"},{"id":"BSI:WID-SEC-2026-1059","cve":"","title":"Notepad++: Schwachstelle ermöglicht Denial of Service","date":"2026-04-13","published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1059","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1059","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-14T09:00:56.117Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1059","added":"2026-04-13T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1059","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1059 notepad++: schwachstelle ermöglicht denial of service bsi bsi","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13"},{"id":"BSI:WID-SEC-2026-1061","cve":"","title":"Varnish HTTP Cache: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-04-13","published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1061","severity":"low","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1061","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-14T09:00:56.117Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1061","added":"2026-04-13T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1061","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"low","search_text":"bsi:wid-sec-2026-1061 varnish http cache: mehrere schwachstellen ermöglichen denial of service bsi bsi","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13"},{"id":"BSI:WID-SEC-2026-1063","cve":"","title":"Linux Kernel: Schwachstelle ermöglicht Denial of Service","date":"2026-04-13","published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1063","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1063","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-14T09:00:56.117Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1063","added":"2026-04-13T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1063","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1063 linux kernel: schwachstelle ermöglicht denial of service bsi bsi","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13"},{"id":"BSI:WID-SEC-2026-1065","cve":"","title":"OpenClaw: Mehrere Schwachstellen","date":"2026-04-13","published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1065","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1065","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-14T09:00:56.117Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1065","added":"2026-04-13T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1065","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1065 openclaw: mehrere schwachstellen bsi bsi","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13"},{"id":"BSI:WID-SEC-2026-1066","cve":"","title":"systemd: Mehrere Schwachstellen","date":"2026-04-13","published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1066","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1066","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-14T09:00:56.117Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1066","added":"2026-04-13T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1066","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1066 systemd: mehrere schwachstellen bsi bsi","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13"},{"id":"BSI:WID-SEC-W-2023-0368","cve":"CVE-2023-21529","title":"Microsoft Exchange: Mehrere Schwachstellen ermöglichen Codeausführung","date":"2023-02-14","published":"2023-02-14","updated":"2026-04-13","source_published":"2023-02-14","source_updated":"2026-04-13","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://msrc.microsoft.com/update-guide","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0368.json","summary":"WID-SEC-W-2023-0368 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0368","summary":"WID-SEC-2023-0368 - Portal Version","category":"self"},{"url":"https://msrc.microsoft.com/update-guide","summary":"Microsoft Leitfaden für Sicherheitsupdates vom 2023-02-14","category":"external"},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog","summary":"CISA Known Exploited Vulnerabilities Catalog vom 2026-04-13","category":"external"}],"severity":"high","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://msrc.microsoft.com/update-guide","published":"2023-02-14","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-14T09:00:56.117Z","sourceUrl":"https://msrc.microsoft.com/update-guide","added":"2026-04-13T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-w-2023-0368 cve-2023-21529 microsoft exchange: mehrere schwachstellen ermöglichen codeausführung msrc bsi","public_published":"2023-02-14","public_updated":"2026-04-13","public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13"},{"id":"BSI:WID-SEC-W-2023-2890","cve":"CVE-2023-24023","title":"Microsoft Windows: Mehrere Schwachstellen","date":"2023-11-14","published":"2023-11-14","updated":"2026-04-13","source_published":"2023-11-14","source_updated":"2026-04-13","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://msrc.microsoft.com/update-guide","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2890.json","summary":"WID-SEC-W-2023-2890 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2890","summary":"WID-SEC-2023-2890 - Portal Version","category":"self"},{"url":"https://msrc.microsoft.com/update-guide","summary":"Microsoft Leitfaden für Sicherheitsupdates vom 2023-11-14","category":"external"},{"url":"https://www.hitachi.com/products/it/storage-solutions/sec_info/2023/11.html","summary":"Hitachi Vulnerability Information HITACHI-SEC-2023-311 vom 2024-02-01","category":"external"},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog","summary":"CISA Known Exploited Vulnerabilities Catalog vom 2026-04-13","category":"external"}],"severity":"critical","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://msrc.microsoft.com/update-guide","published":"2023-11-14","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-14T09:00:56.117Z","sourceUrl":"https://msrc.microsoft.com/update-guide","added":"2026-04-13T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":null,"severity_norm":"critical","search_text":"bsi:wid-sec-w-2023-2890 cve-2023-24023 microsoft windows: mehrere schwachstellen msrc bsi","public_published":"2023-11-14","public_updated":"2026-04-13","public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13"},{"id":"BSI:WID-SEC-W-2024-1259","cve":"CVE-2023-52881","title":"Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service und unspezifischen Angriff","date":"2024-05-30","published":"2024-05-30","updated":"2026-04-13","source_published":"2024-05-30","source_updated":"2026-04-13","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://lore.kernel.org/","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1259.json","summary":"WID-SEC-W-2024-1259 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1259","summary":"WID-SEC-2024-1259 - Portal Version","category":"self"},{"url":"https://lore.kernel.org/","summary":"https://lore.kernel.org/linux-cve-announce/ vom 2024-05-30","category":"external"},{"url":"https://lists.debian.org/debian-security-announce/2024/msg00113.html","summary":"Debian Security Advisory DSA-5703 vom 2024-06-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018685.html","summary":"SUSE Security Update SUSE-SU-2024:1979-1 vom 2024-06-11","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018700.html","summary":"SUSE Security Update SUSE-SU-2024:1983-1 vom 2024-06-11","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2024-044.html","summary":"Amazon Linux Security Advisory ALASKERNEL-5.15-2024-044 vom 2024-06-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018710.html","summary":"SUSE Security Update SUSE-SU-2024:2011-1 vom 2024-06-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018706.html","summary":"SUSE Security Update SUSE-SU-2024:2008-1 vom 2024-06-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018783.html","summary":"SUSE Security Update SUSE-SU-2024:2135-1 vom 2024-06-21","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-060.html","summary":"Amazon Linux Security Advisory ALASKERNEL-5.10-2024-060 vom 2024-06-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018807.html","summary":"SUSE Security Update SUSE-SU-2024:2184-1 vom 2024-06-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018811.html","summary":"SUSE Security Update SUSE-SU-2024:2189-1 vom 2024-06-25","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html","summary":"Debian Security Advisory DLA-3842 vom 2024-06-25","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4108","summary":"Red Hat Security Advisory RHSA-2024:4108 vom 2024-06-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018819.html","summary":"SUSE Security Update SUSE-SU-2024:2190-1 vom 2024-06-25","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4106","summary":"Red Hat Security Advisory RHSA-2024:4106 vom 2024-06-26","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html","summary":"Debian Security Advisory DLA-3843 vom 2024-06-27","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html","summary":"Debian Security Advisory DLA-3840 vom 2024-06-27","category":"external"},{"url":"https://alas.aws.amazon.com/AL2023/ALAS-2024-643.html","summary":"Amazon Linux Security Advisory ALAS-2024-643 vom 2024-07-02","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4211","summary":"Red Hat Security Advisory RHSA-2024:4211 vom 2024-07-02","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4151","summary":"Red Hat Security Advisory RHSA-2024:4151 vom 2024-07-03","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018897.html","summary":"SUSE Security Update SUSE-SU-2024:2365-1 vom 2024-07-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018907.html","summary":"SUSE Security Update SUSE-SU-2024:2360-1 vom 2024-07-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018901.html","summary":"SUSE Security Update SUSE-SU-2024:2372-1 vom 2024-07-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018905.html","summary":"SUSE Security Update SUSE-SU-2024:2362-1 vom 2024-07-09","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4447","summary":"Red Hat Security Advisory RHSA-2024:4447 vom 2024-07-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018916.html","summary":"SUSE Security Update SUSE-SU-2024:2381-1 vom 2024-07-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018922.html","summary":"SUSE Security Update SUSE-SU-2024:2394-1 vom 2024-07-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018920.html","summary":"SUSE Security Update SUSE-SU-2024:2385-1 vom 2024-07-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4321","summary":"Red Hat Security Advisory RHSA-2024:4321 vom 2024-07-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018921.html","summary":"SUSE Security Update SUSE-SU-2024:2384-1 vom 2024-07-10","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6893-1","summary":"Ubuntu Security Notice USN-6893-1 vom 2024-07-11","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4533","summary":"Red Hat Security Advisory RHSA-2024:4533 vom 2024-07-15","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6896-1","summary":"Ubuntu Security Notice USN-6896-1 vom 2024-07-12","category":"external"},{"url":"https://lists.debian.org/debian-security-announce/2024/msg00141.html","summary":"Debian Security Advisory DSA-5730 vom 2024-07-16","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2024:4211","summary":"Rocky Linux Security Advisory RLSA-2024:4211 vom 2024-07-15","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6898-1","summary":"Ubuntu Security Notice USN-6898-1 vom 2024-07-15","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4548","summary":"Red Hat Security Advisory RHSA-2024:4548 vom 2024-07-15","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2024:4352","summary":"Rocky Linux Security Advisory RLSA-2024:4352 vom 2024-07-15","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4554","summary":"Red Hat Security Advisory RHSA-2024:4554 vom 2024-07-16","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4547","summary":"Red Hat Security Advisory RHSA-2024:4547 vom 2024-07-15","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6893-2","summary":"Ubuntu Security Notice USN-6893-2 vom 2024-07-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html","summary":"SUSE Security Update SUSE-SU-2024:2495-1 vom 2024-07-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018984.html","summary":"SUSE Security Update SUSE-SU-2024:2493-1 vom 2024-07-16","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6896-2","summary":"Ubuntu Security Notice USN-6896-2 vom 2024-07-16","category":"external"},{"url":"https://lists.debian.org/debian-security-announce/2024/msg00142.html","summary":"Debian Security Advisory DSA-5731 vom 2024-07-17","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4583","summary":"Red Hat Security Advisory RHSA-2024:4583 vom 2024-07-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6896-3","summary":"Ubuntu Security Notice USN-6896-3 vom 2024-07-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6898-2","summary":"Ubuntu Security Notice USN-6898-2 vom 2024-07-17","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-4583.html","summary":"Oracle Linux Security Advisory ELSA-2024-4583 vom 2024-07-19","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4631","summary":"Red Hat Security Advisory RHSA-2024:4631 vom 2024-07-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html","summary":"SUSE Security Update SUSE-SU-2024:2561-1 vom 2024-07-18","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6898-3","summary":"Ubuntu Security Notice USN-6898-3 vom 2024-07-19","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6896-4","summary":"Ubuntu Security Notice USN-6896-4 vom 2024-07-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/019019.html","summary":"SUSE Security Update SUSE-SU-2024:2571-1 vom 2024-07-22","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4713","summary":"Red Hat Security Advisory RHSA-2024:4713 vom 2024-07-23","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6896-5","summary":"Ubuntu Security Notice USN-6896-5 vom 2024-07-23","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6893-3","summary":"Ubuntu Security Notice USN-6893-3 vom 2024-07-23","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6898-4","summary":"Ubuntu Security Notice USN-6898-4 vom 2024-07-23","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4823","summary":"Red Hat Security Advisory RHSA-2024:4823 vom 2024-07-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4831","summary":"Red Hat Security Advisory RHSA-2024:4831 vom 2024-07-24","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2024:4583","summary":"Rocky Linux Security Advisory RLSA-2024:4583 vom 2024-07-26","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6919-1","summary":"Ubuntu Security Notice USN-6919-1 vom 2024-07-26","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6917-1","summary":"Ubuntu Security Notice USN-6917-1 vom 2024-07-26","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6918-1","summary":"Ubuntu Security Notice USN-6918-1 vom 2024-07-26","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6923-1","summary":"Ubuntu Security Notice USN-6923-1 vom 2024-07-29","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6924-1","summary":"Ubuntu Security Notice USN-6924-1 vom 2024-07-29","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4902","summary":"Red Hat Security Advisory RHSA-2024:4902 vom 2024-07-29","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6921-1","summary":"Ubuntu Security Notice USN-6921-1 vom 2024-07-29","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6926-1","summary":"Ubuntu Security Notice USN-6926-1 vom 2024-07-29","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6921-2","summary":"Ubuntu Security Notice USN-6921-2 vom 2024-07-30","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6923-2","summary":"Ubuntu Security Notice USN-6923-2 vom 2024-07-30","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6924-2","summary":"Ubuntu Security Notice USN-6924-2 vom 2024-07-30","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6927-1","summary":"Ubuntu Security Notice USN-6927-1 vom 2024-07-30","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4928","summary":"Red Hat Security Advisory RHSA-2024:4928 vom 2024-07-31","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6938-1","summary":"Ubuntu Security Notice USN-6938-1 vom 2024-07-31","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2024:4928","summary":"Rocky Linux Security Advisory RLSA-2024:4928 vom 2024-08-01","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-4928.html","summary":"Oracle Linux Security Advisory ELSA-2024-4928 vom 2024-08-01","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6926-2","summary":"Ubuntu Security Notice USN-6926-2 vom 2024-08-01","category":"external"},{"url":"https://www.dell.com/support/kbdoc/de-de/000227573/dsa-2024-348-security-update-for-dell-avamar-dell-networker-virtual-edition-nve-and-dell-powerprotect-dp-series-appliance-dell-integrated-data-protection-appliance-idpa-security-update-for-multiple-vulnerabilities","summary":"Dell Security Advisory DSA-2024-348 vom 2024-08-06","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-12571.html","summary":"Oracle Linux Security Advisory ELSA-2024-12571 vom 2024-08-06","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-12570.html","summary":"Oracle Linux Security Advisory ELSA-2024-12570 vom 2024-08-06","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5066","summary":"Red Hat Security Advisory RHSA-2024:5066 vom 2024-08-07","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5067","summary":"Red Hat Security Advisory RHSA-2024:5067 vom 2024-08-07","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html","summary":"SUSE Security Update SUSE-SU-2024:2802-1 vom 2024-08-07","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5101","summary":"Red Hat Security Advisory RHSA-2024:5101 vom 2024-08-08","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5102","summary":"Red Hat Security Advisory RHSA-2024:5102 vom 2024-08-08","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6950-1","summary":"Ubuntu Security Notice USN-6950-1 vom 2024-08-09","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6951-1","summary":"Ubuntu Security Notice USN-6951-1 vom 2024-08-09","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6949-1","summary":"Ubuntu Security Notice USN-6949-1 vom 2024-08-09","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6953-1","summary":"Ubuntu Security Notice USN-6953-1 vom 2024-08-09","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6952-1","summary":"Ubuntu Security Notice USN-6952-1 vom 2024-08-09","category":"external"},{"url":"https://oss.oracle.com/pipermail/oraclevm-errata/2024-August/001098.html","summary":"ORACLE OVMSA-2024-0010 vom 2024-08-08","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-5101.html","summary":"Oracle Linux Security Advisory ELSA-2024-5101 vom 2024-08-09","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6926-3","summary":"Ubuntu Security Notice USN-6926-3 vom 2024-08-09","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6957-1","summary":"Ubuntu Security Notice USN-6957-1 vom 2024-08-13","category":"external"},{"url":"https://security-tracker.debian.org/tracker/DSA-5747-1","summary":"Debian Security Advisory DSA-5747 vom 2024-08-12","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5255","summary":"Red Hat Security Advisory RHSA-2024:5255 vom 2024-08-13","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6956-1","summary":"Ubuntu Security Notice USN-6956-1 vom 2024-08-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5256","summary":"Red Hat Security Advisory RHSA-2024:5256 vom 2024-08-13","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6955-1","summary":"Ubuntu Security Notice USN-6955-1 vom 2024-08-12","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5257","summary":"Red Hat Security Advisory RHSA-2024:5257 vom 2024-08-13","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6950-2","summary":"Ubuntu Security Notice USN-6950-2 vom 2024-08-13","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-12584.html","summary":"Oracle Linux Security Advisory ELSA-2024-12584 vom 2024-08-13","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-12581.html","summary":"Oracle Linux Security Advisory ELSA-2024-12581 vom 2024-08-13","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-12585.html","summary":"Oracle Linux Security Advisory ELSA-2024-12585 vom 2024-08-13","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-066.html","summary":"Amazon Linux Security Advisory ALASKERNEL-5.10-2024-066 vom 2024-08-13","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6949-2","summary":"Ubuntu Security Notice USN-6949-2 vom 2024-08-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html","summary":"SUSE Security Update SUSE-SU-2024:2896-1 vom 2024-08-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5281","summary":"Red Hat Security Advisory RHSA-2024:5281 vom 2024-08-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019186.html","summary":"SUSE Security Update SUSE-SU-2024:2895-1 vom 2024-08-13","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6950-3","summary":"Ubuntu Security Notice USN-6950-3 vom 2024-08-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019182.html","summary":"SUSE Security Update SUSE-SU-2024:2894-1 vom 2024-08-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html","summary":"SUSE Security Update SUSE-SU-2024:2892-1 vom 2024-08-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5363","summary":"Red Hat Security Advisory RHSA-2024:5363 vom 2024-08-14","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5365","summary":"Red Hat Security Advisory RHSA-2024:5365 vom 2024-08-14","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5364","summary":"Red Hat Security Advisory RHSA-2024:5364 vom 2024-08-14","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6952-2","summary":"Ubuntu Security Notice USN-6952-2 vom 2024-08-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019194.html","summary":"SUSE Security Update SUSE-SU-2024:2901-1 vom 2024-08-14","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6951-2","summary":"Ubuntu Security Notice USN-6951-2 vom 2024-08-14","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-5363.html","summary":"Oracle Linux Security Advisory ELSA-2024-5363 vom 2024-08-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019209.html","summary":"SUSE Security Update SUSE-SU-2024:2929-1 vom 2024-08-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html","summary":"SUSE Security Update SUSE-SU-2024:2939-1 vom 2024-08-16","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5520","summary":"Red Hat Security Advisory RHSA-2024:5520 vom 2024-08-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019220.html","summary":"SUSE Security Update SUSE-SU-2024:2947-1 vom 2024-08-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019212.html","summary":"SUSE Security Update SUSE-SU-2024:2940-1 vom 2024-08-16","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5522","summary":"Red Hat Security Advisory RHSA-2024:5522 vom 2024-08-19","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6951-3","summary":"Ubuntu Security Notice USN-6951-3 vom 2024-08-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html","summary":"SUSE Security Update SUSE-SU-2024:2203-1 vom 2024-08-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html","summary":"SUSE Security Update SUSE-SU-2024:2973-1 vom 2024-08-20","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5673","summary":"Red Hat Security Advisory RHSA-2024:5673 vom 2024-08-21","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5672","summary":"Red Hat Security Advisory RHSA-2024:5672 vom 2024-08-21","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6951-4","summary":"Ubuntu Security Notice USN-6951-4 vom 2024-08-21","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6950-4","summary":"Ubuntu Security Notice USN-6950-4 vom 2024-08-21","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2024:5101","summary":"Rocky Linux Security Advisory RLSA-2024:5101 vom 2024-08-21","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6973-1","summary":"Ubuntu Security Notice USN-6973-1 vom 2024-08-22","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6974-1","summary":"Ubuntu Security Notice USN-6974-1 vom 2024-08-22","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6972-1","summary":"Ubuntu Security Notice USN-6972-1 vom 2024-08-21","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6976-1","summary":"Ubuntu Security Notice USN-6976-1 vom 2024-08-22","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2024:5102","summary":"Rocky Linux Security Advisory RLSA-2024:5102 vom 2024-08-21","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5692","summary":"Red Hat Security Advisory RHSA-2024:5692 vom 2024-08-21","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6979-1","summary":"Ubuntu Security Notice USN-6979-1 vom 2024-08-22","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6972-2","summary":"Ubuntu Security Notice USN-6972-2 vom 2024-08-22","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6972-3","summary":"Ubuntu Security Notice USN-6973-2 vom 2024-08-23","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6974-2","summary":"Ubuntu Security Notice USN-6974-2 vom 2024-08-23","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6973-2","summary":"Ubuntu Security Notice USN-6973-2 vom 2024-08-23","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5858","summary":"Red Hat Security Advisory RHSA-2024:5858 vom 2024-08-26","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6973-3","summary":"Ubuntu Security Notice USN-6973-3 vom 2024-08-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019316.html","summary":"SUSE Security Update SUSE-SU-2024:3032-1 vom 2024-08-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019328.html","summary":"SUSE Security Update SUSE-SU-2024:3060-1 vom 2024-08-28","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5928","summary":"Red Hat Security Advisory RHSA-2024:5928 vom 2024-08-28","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6972-4","summary":"Ubuntu Security Notice USN-6972-4 vom 2024-08-29","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-5928.html","summary":"Oracle Linux Security Advisory ELSA-2024-5928 vom 2024-08-29","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6973-4","summary":"Ubuntu Security Notice USN-6973-4 vom 2024-09-02","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-12606.html","summary":"Oracle Linux Security Advisory ELSA-2024-12606 vom 2024-09-03","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:6206","summary":"Red Hat Security Advisory RHSA-2024:6206 vom 2024-09-03","category":"external"},{"url":"https://oss.oracle.com/pipermail/oraclevm-errata/2024-September/001099.html","summary":"ORACLE OVMSA-2024-0011 vom 2024-09-04","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7167662","summary":"IBM Security Bulletin 7167662 vom 2024-09-05","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019407.html","summary":"SUSE Security Update SUSE-SU-2024:3195-1 vom 2024-09-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019400.html","summary":"SUSE Security Update SUSE-SU-2024:3194-1 vom 2024-09-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:6567","summary":"Red Hat Security Advisory RHSA-2024:6567 vom 2024-09-11","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html","summary":"SUSE Security Update SUSE-SU-2024:3190-1 vom 2024-09-10","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-12611.html","summary":"Oracle Linux Security Advisory ELSA-2024-12611 vom 2024-09-11","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-6567.html","summary":"Oracle Linux Security Advisory ELSA-2024-6567 vom 2024-09-12","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-12618.html","summary":"Oracle Linux Security Advisory ELSA-2024-12618 vom 2024-09-12","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YNWVZVIFSX7PLBJX3I3PDZ4MIBERTN2Y/","summary":"SUSE Security Update SUSE-SU-2024:3209-1 vom 2024-09-11","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-12610.html","summary":"Oracle Linux Security Advisory ELSA-2024-12610 vom 2024-09-12","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-12612.html","summary":"Oracle Linux Security Advisory ELSA-2024-12612 vom 2024-09-12","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7003-1","summary":"Ubuntu Security Notice USN-7003-1 vom 2024-09-12","category":"external"},{"url":"https://security.netapp.com/advisory/ntap-20240912-0006/","summary":"NetApp Security Advisory NTAP-20240912-0006 vom 2024-09-12","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7006-1","summary":"Ubuntu Security Notice USN-7006-1 vom 2024-09-12","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7003-3","summary":"Ubuntu Security Notice USN-7003-3 vom 2024-09-13","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7007-1","summary":"Ubuntu Security Notice USN-7007-1 vom 2024-09-13","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7009-1","summary":"Ubuntu Security Notice USN-7009-1 vom 2024-09-13","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2024:6567","summary":"Rocky Linux Security Advisory RLSA-2024:6567 vom 2024-09-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019487.html","summary":"SUSE Security Update SUSE-SU-2024:3370-1 vom 2024-09-23","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7007-2","summary":"Ubuntu Security Notice USN-7007-2 vom 2024-09-23","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7007-3","summary":"Ubuntu Security Notice USN-7007-3 vom 2024-09-23","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:7003","summary":"Red Hat Security Advisory RHSA-2024:7003 vom 2024-09-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:6993","summary":"Red Hat Security Advisory RHSA-2024:6993 vom 2024-09-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html","summary":"SUSE Security Update SUSE-SU-2024:3383-1 vom 2024-09-23","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:6998","summary":"Red Hat Security Advisory RHSA-2024:6998 vom 2024-09-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:7002","summary":"Red Hat Security Advisory RHSA-2024:7002 vom 2024-09-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:7004","summary":"Red Hat Security Advisory RHSA-2024:7004 vom 2024-09-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:7005","summary":"Red Hat Security Advisory RHSA-2024:7005 vom 2024-09-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:6997","summary":"Red Hat Security Advisory RHSA-2024:6997 vom 2024-09-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:7001","summary":"Red Hat Security Advisory RHSA-2024:7001 vom 2024-09-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:7000","summary":"Red Hat Security Advisory RHSA-2024:7000 vom 2024-09-24","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7009-2","summary":"Ubuntu Security Notice USN-7009-2 vom 2024-09-25","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-7000.html","summary":"Oracle Linux Security Advisory ELSA-2024-7000 vom 2024-09-26","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-6997.html","summary":"Oracle Linux Security Advisory ELSA-2024-6997 vom 2024-09-26","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7003-4","summary":"Ubuntu Security Notice USN-7003-4 vom 2024-09-26","category":"external"},{"url":"https://security.netapp.com/advisory/ntap-20240926-0002/","summary":"NetApp Security Advisory NTAP-20240926-0002 vom 2024-09-26","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2HO244EHQ65DPDJ2NOBAXLG7QYWSCUMA/","summary":"SUSE Security Update SUSE-SU-2024:3483-1 vom 2024-09-29","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/2HO244EHQ65DPDJ2NOBAXLG7QYWSCUMA/","summary":"SUSE Security Update SUSE-SU-2024:3483-1 vom 2024-09-29","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:7427","summary":"Red Hat Security Advisory RHSA-2024:7427 vom 2024-10-01","category":"external"},{"url":"http://linux.oracle.com/errata/ELSA-2024-12682.html","summary":"Oracle Linux Security Advisory ELSA-2024-12682 vom 2024-09-30","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2024:7001","summary":"Rocky Linux Security Advisory RLSA-2024:7001 vom 2024-09-30","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7003-5","summary":"Ubuntu Security Notice USN-7003-5 vom 2024-10-01","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/Q7MIMQMCXNGMVS32KLTADYTPQCKF5HWU/","summary":"SUSE Security Update SUSE-SU-2024:3551-1 vom 2024-10-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-October/019560.html","summary":"SUSE Security Update SUSE-SU-2024:3553-1 vom 2024-10-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-October/019562.html","summary":"SUSE Security Update SUSE-SU-2024:3551-1 vom 2024-10-08","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/R7FS3QARF7WUPH5GFL22NW3G3SDO2C7Z/","summary":"SUSE Security Update SUSE-SU-2024:3564-1 vom 2024-10-09","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LSUY4BSWS5WR46CHS4FPBIJIRLKHRDHV/","summary":"SUSE Security Update SUSE-SU-2024:3561-1 vom 2024-10-09","category":"external"},{"url":"https://www.dell.com/support/kbdoc/de-de/000234730/dsa-2024-422-security-update-for-dell-networker-vproxy-multiple-component-vulnerabilities","summary":"Dell Security Advisory DSA-2024-422 vom 2024-10-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:8107","summary":"Red Hat Security Advisory RHSA-2024:8107 vom 2024-10-15","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-12779.html","summary":"Oracle Linux Security Advisory ELSA-2024-12779 vom 2024-10-14","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/XCWDJ4VQNWRMZU52FZIMVKO3ZX7QR3L7/","summary":"SUSE Security Update SUSE-SU-2024:3625-1 vom 2024-10-15","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/TF6OKVTF5VSUGWWYIUXLV2YZK7NYELIN/","summary":"SUSE Security Update SUSE-SU-2024:3623-1 vom 2024-10-15","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/V4GVQWREKLT3NIX5GMPMO26GXLKRGTXJ/","summary":"SUSE Security Update SUSE-SU-2024:3624-1 vom 2024-10-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-October/019596.html","summary":"SUSE Security Update SUSE-SU-2024:3628-1 vom 2024-10-15","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QREDIZHMC5MCDU7XHJHAPFFVPPIKTHWD/","summary":"SUSE Security Update SUSE-SU-2024:3639-1 vom 2024-10-15","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/6PEVJU5FBJP53YMNJCB4SQC2P7VOWDEQ/","summary":"SUSE Security Update SUSE-SU-2024:3636-1 vom 2024-10-15","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/G5I2ZVAM4BJDGCYJE64AKFTDGHVIU5SH/","summary":"SUSE Security Update SUSE-SU-2024:3638-1 vom 2024-10-15","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/BL3RXEW5VDVX6HS5GR4KUH6GDRT5OFQF/","summary":"SUSE Security Update SUSE-SU-2024:3635-1 vom 2024-10-15","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VBN5S6CN75ZWGV3ZNRLZRMQ5DF3HMBZE/","summary":"SUSE Security Update SUSE-SU-2024:3631-1 vom 2024-10-15","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/IMA2L435Y3DOAG6IL6IEIK2SUGPOUZXD/","summary":"SUSE Security Update SUSE-SU-2024:3632-1 vom 2024-10-15","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:8162","summary":"Red Hat Security Advisory RHSA-2024:8162 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VPMT5STAWY6BTO5OI2PZ7CG4AXOIQKZN/","summary":"SUSE Security Update SUSE-SU-2024:3643-1 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/EUYMTMU2SZQY2ZOCLHCYEZ2A2LJUYBHS/","summary":"SUSE Security Update SUSE-SU-2024:3666-1 vom 2024-10-16","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-8162.html","summary":"Oracle Linux Security Advisory ELSA-2024-8162 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/RDWWWR2VCADWSQCCZNNFB4VWOMZDOC63/","summary":"SUSE Security Update SUSE-SU-2024:3679-1 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/A6BRGXRVSUAODD2ZZSX5GJCV46W4N5YB/","summary":"SUSE Security Update SUSE-SU-2024:3697-1 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/BPAXFMRC3YVPDHRGBWET3RB7YTYFYLZW/","summary":"SUSE Security Update SUSE-SU-2024:3702-1 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/SVZDNTNDPAUIILRXFRA47BDSDZ3IUQTH/","summary":"SUSE Security Update SUSE-SU-2024:3701-1 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YYPGEHXE3QJ5NBRD57VSRTM36AC5DISM/","summary":"SUSE Security Update SUSE-SU-2024:3696-1 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/G3EDKBVPHAPKDJ45CNEJLJ4KGJAHJ4R7/","summary":"SUSE Security Update SUSE-SU-2024:3700-1 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/MOG44NUGCSJS6Q3AKMCV3X4IK2DN6CLL/","summary":"SUSE Security Update SUSE-SU-2024:3695-1 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/P4LIA2SNUYEEYDFH7Q72CHUMA7X4NIY3/","summary":"SUSE Security Update SUSE-SU-2024:3655-1 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/4EP6HEEGSXRVOUJD4YZEG2C7DZBR6MK3/","summary":"SUSE Security Update SUSE-SU-2024:3680-1 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/MGSVPDAL2ET3FWE6YAGBX3UOQOVXTPXB/","summary":"SUSE Security Update SUSE-SU-2024:3672-1 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/Y2P3R5HQ4Z7AYZLBXUGXBJMITFENT5NV/","summary":"SUSE Security Update SUSE-SU-2024:3694-1 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/JVBPTC5SNYDIYERI2QA3SDI56HZRXTU4/","summary":"SUSE Security Update SUSE-SU-2024:3670-1 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/CLMHYECK5YKZDDXZ7XKEL3G5JXCF5QRM/","summary":"SUSE Security Update SUSE-SU-2024:3710-1 vom 2024-10-17","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/IUM757WJ43K7PF2K6A3UQHWG2QALK24F/","summary":"SUSE Security Update SUSE-SU-2024:3706-1 vom 2024-10-17","category":"external"},{"url":"https://security.netapp.com/advisory/ntap-20241018-0001/","summary":"NetApp Security Advisory NTAP-20241018-0001 vom 2024-10-18","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:8318","summary":"Red Hat Security Advisory RHSA-2024:8318 vom 2024-10-23","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2024:8162","summary":"Rocky Linux Security Advisory RLSA-2024:8162 vom 2024-10-25","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRFC54YJNAIE647NXDXGDHFV6UDF5EPM/","summary":"SUSE Security Update SUSE-SU-2024:3780-1 vom 2024-10-30","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/ZRFC54YJNAIE647NXDXGDHFV6UDF5EPM/","summary":"SUSE Security Update SUSE-SU-2024:3780-1 vom 2024-10-30","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:8613","summary":"Red Hat Security Advisory RHSA-2024:8613 vom 2024-10-30","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:8614","summary":"Red Hat Security Advisory RHSA-2024:8614 vom 2024-10-30","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/I22FOLEFZIBTJBTIPHH5GXPKMIXVDSDI/","summary":"SUSE Security Update SUSE-SU-2024:3806-1 vom 2024-10-30","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/JIUM76237NQIAK3CP7ENKHD5EOEBDHZH/","summary":"SUSE Security Update SUSE-SU-2024:3815-1 vom 2024-10-30","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QK6PZZGVJB6TX4W6LKJNJW74SGTITNGD/","summary":"SUSE Security Update SUSE-SU-2024:3831-1 vom 2024-10-30","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VHXZ2BQRCVWQY2AVSULS6AN56SITZ273/","summary":"SUSE Security Update SUSE-SU-2024:3837-1 vom 2024-10-30","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/RMOWLUMWUZKBWNWZRVPCJY43YUOMCMJ7/","summary":"SUSE Security Update SUSE-SU-2024:3829-1 vom 2024-10-30","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/5FIXDPPFE66BKRWS3X45YHODJJ57FQRT/","summary":"SUSE Security Update SUSE-SU-2024:3830-1 vom 2024-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html","summary":"SUSE Security Update SUSE-SU-2024:3793-1 vom 2024-10-30","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/46CHUG3NHK74I7NL4E3MYL6M7O72UAE6/","summary":"SUSE Security Update SUSE-SU-2024:3833-1 vom 2024-10-30","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VVJDY73ZQLYG6XTLPXQKV6DOXIBCWQNH/","summary":"SUSE Security Update SUSE-SU-2024:3842-1 vom 2024-10-31","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/O2CG2OGLBEZR2LX5UI6PTT5NVZOFNGQH/","summary":"SUSE Security Update SUSE-SU-2024:3840-1 vom 2024-10-31","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/CJCHUFTBOJTQRE24NTRP6WMCK5BGPZ3N/","summary":"SUSE Security Update SUSE-SU-2024:3852-1 vom 2024-10-31","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/7YDAYBSAUUUZVVIKYWRRX5O6ZCOQ2K46/","summary":"SUSE Security Update SUSE-SU-2024:3851-1 vom 2024-10-31","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/DM3QIZHKHG7AW6EAKKMMWCCUOYK4JU3R/","summary":"SUSE Security Update SUSE-SU-2024:3857-1 vom 2024-10-31","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/HVT4PHTMBZOBVPW2CI26GVIVJNWCBTVN/","summary":"SUSE Security Update SUSE-SU-2024:3855-1 vom 2024-10-31","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/UFUASUPHAEZFWXKIMGZLIZD4LHGMJ5YW/","summary":"SUSE Security Update SUSE-SU-2024:3860-1 vom 2024-10-31","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7174634","summary":"IBM Security Bulletin","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/4FKA7N5AUZ6CDGAARMRU76MNKUZHMPAH/","summary":"SUSE Security Update SUSE-SU-2024:3880-1 vom 2024-11-04","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/ZOOTWA362J2SG2EX2CE3LPBWPJ7GVK2B/","summary":"SUSE Security Update SUSE-SU-2024:3881-1 vom 2024-11-04","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-12813.html","summary":"Oracle Linux Security Advisory ELSA-2024-12813 vom 2024-11-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:9315","summary":"Red Hat Security Advisory RHSA-2024:9315 vom 2024-11-12","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-12815.html","summary":"Oracle Linux Security Advisory ELSA-2024-12815 vom 2024-11-13","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/KB6DG7QR5KXDQRV57H4IY2TB2LW42K4S/","summary":"SUSE Security Update SUSE-SU-2024:3985-1 vom 2024-11-13","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QUOFKELDJYP3JMHIXPCVKVI4REVXAKTX/","summary":"SUSE Security Update SUSE-SU-2024:3983-1 vom 2024-11-13","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/L52VEDNTEHWEPR56WZN4KZNMEUYGCJX6/","summary":"SUSE Security Update SUSE-SU-2024:3984-1 vom 2024-11-13","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7121-1","summary":"Ubuntu Security Notice USN-7121-1 vom 2024-11-20","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7121-2","summary":"Ubuntu Security Notice USN-7121-2 vom 2024-11-20","category":"external"},{"url":"https://lists.debian.org/debian-security-announce/2024/msg00233.html","summary":"Debian Security Advisory DSA-5818 vom 2024-11-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:10262","summary":"Red Hat Security Advisory RHSA-2024:10262 vom 2024-11-26","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7121-3","summary":"Ubuntu Security Notice USN-7121-3 vom 2024-11-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html","summary":"SUSE Security Update SUSE-SU-2024:4082-1 vom 2024-11-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html","summary":"SUSE Security Update SUSE-SU-2024:4081-1 vom 2024-11-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html","summary":"SUSE Security Update SUSE-SU-2024:4103-1 vom 2024-11-28","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html","summary":"SUSE Security Update SUSE-SU-2024:4100-1 vom 2024-11-28","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html","summary":"SUSE Security Update SUSE-SU-2024:4131-1 vom 2024-12-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019879.html","summary":"SUSE Security Update SUSE-SU-2024:4129-1 vom 2024-12-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019888.html","summary":"SUSE Security Update SUSE-SU-2024:4141-1 vom 2024-12-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html","summary":"SUSE Security Update SUSE-SU-2024:4124-1 vom 2024-12-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019881.html","summary":"SUSE Security Update SUSE-SU-2024:4127-1 vom 2024-12-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html","summary":"SUSE Security Update SUSE-SU-2024:4123-1 vom 2024-12-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html","summary":"SUSE Security Update SUSE-SU-2024:4122-1 vom 2024-12-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019886.html","summary":"SUSE Security Update SUSE-SU-2024:4120-1 vom 2024-12-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html","summary":"SUSE Security Update SUSE-SU-2024:4125-1 vom 2024-12-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html","summary":"SUSE Security Update SUSE-SU-2024:4140-1 vom 2024-12-02","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:10773","summary":"Red Hat Security Advisory RHSA-2024:10773 vom 2024-12-04","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:10772","summary":"Red Hat Security Advisory RHSA-2024:10772 vom 2024-12-04","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/CIKG67SDI2FHVFOUWGSFTWXBX6AJTWEQ/","summary":"SUSE Security Update SUSE-SU-2024:4179-1 vom 2024-12-05","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/3ACAYSLQECATBMYSIXEOONW3SJQYVWGD/","summary":"SUSE Security Update SUSE-SU-2024:4180-1 vom 2024-12-05","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/EXGR6SY2Q2Z3TLER4MUKW35TYBEOJEMH/","summary":"SUSE Security Update SUSE-SU-2024:4177-1 vom 2024-12-04","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXGR6SY2Q2Z3TLER4MUKW35TYBEOJEMH/","summary":"SUSE Security Update SUSE-SU-2024:4177-1 vom 2024-12-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019912.html","summary":"SUSE Security Update SUSE-SU-2024:4177-1 vom 2024-12-04","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/KHOJJYPB3I2C5FKMLHD5WFCQI342KAXA/","summary":"SUSE Security Update SUSE-SU-2024:4207-1 vom 2024-12-05","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/FSWHAR4P5O4W4NVL7QLKN3Y3Z6UJX4CO/","summary":"SUSE Security Update SUSE-SU-2024:4206-1 vom 2024-12-05","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/HJOOCIMJWVQXHEUVET7W2XBWXJY6XR6M/","summary":"SUSE Security Update SUSE-SU-2024:4208-1 vom 2024-12-05","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/KZC5ZXKVE5JSNEKEAICAO52WN7SOJCTX/","summary":"SUSE Security Update SUSE-SU-2024:4216-1 vom 2024-12-05","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/M53UYAMNDLCCFQJMB3EWLVYJENF2J65Z/","summary":"SUSE Security Update SUSE-SU-2024:4217-1 vom 2024-12-05","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/P4UZ4KLYIQHACIYR7LE2ANITUCPLWFYS/","summary":"SUSE Security Update SUSE-SU-2024:4214-1 vom 2024-12-05","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/4UVNDL3CU4NHVPE7QELR2N5HRCDSMYEV/","summary":"SUSE Security Update SUSE-SU-2024:4218-1 vom 2024-12-06","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/5LS3ZVBG6LNL6BFVLEKSCPDDZTE7XQIS/","summary":"SUSE Security Update SUSE-SU-2024:4220-1 vom 2024-12-06","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/R6NJTIPCJBC7ULVGL3ST3ZEMPJQ6UE7K/","summary":"SUSE Security Update SUSE-SU-2024:4227-1 vom 2024-12-06","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LIMMCWFWYJUMJTABZZ7ZEYXOOVE5BZY7/","summary":"SUSE Security Update SUSE-SU-2024:4235-1 vom 2024-12-06","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html","summary":"SUSE Security Update SUSE-SU-2024:4242-1 vom 2024-12-06","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/ODASOBSBN3UUGHNO44MK2K4MC35CPLXJ/","summary":"SUSE Security Update SUSE-SU-2024:4236-1 vom 2024-12-06","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/GDL3TRRFKGYVQIW7MMTUJS76GCW7B3JZ/","summary":"SUSE Security Update SUSE-SU-2024:4243-1 vom 2024-12-06","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/B6RMLGICBLD3BNXSBS7J23W3GCEJMFJA/","summary":"SUSE Security Update SUSE-SU-2024:4234-1 vom 2024-12-06","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/DMN7SCFOSTXIR74OFGMHOJLOSHZOF3RH/","summary":"SUSE Security Update SUSE-SU-2024:4230-1 vom 2024-12-06","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019959.html","summary":"SUSE Security Update SUSE-SU-2024:4241-1 vom 2024-12-06","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/SUCQUP757AUWMZNCNQ2DGQICEYBRZUIC/","summary":"SUSE Security Update SUSE-SU-2024:4228-1 vom 2024-12-06","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019946.html","summary":"SUSE Security Update SUSE-SU-2024:4231-1 vom 2024-12-06","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/34BVCDIDBQSXQ6Y3TVDGD4FSZ7N3D3LI/","summary":"SUSE Security Update SUSE-SU-2024:4256-1 vom 2024-12-06","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/3LFFLGXO55CBY4WD74GYLL6CL2HWJM2Q/","summary":"SUSE Security Update SUSE-SU-2024:4246-1 vom 2024-12-06","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html","summary":"SUSE Security Update SUSE-SU-2024:4250-1 vom 2024-12-06","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RRJRAM3LFR4MNOHCFB2XIOS6OJUDNUPE/","summary":"SUSE Security Update SUSE-SU-2024:4266-1 vom 2024-12-09","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LFH2MVQS6KSRYDULB5KJQ5L72KPQCO6L/","summary":"SUSE Security Update SUSE-SU-2024:4265-1 vom 2024-12-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html","summary":"SUSE Security Update SUSE-SU-2024:4263-1 vom 2024-12-09","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/SZPUHL7SUZ57L3OJFO25IHYVDJ76ONGC/","summary":"SUSE Security Update SUSE-SU-2024:4264-1 vom 2024-12-09","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/OANRUYCXIPE5N4KSSYCB3BUCEHKCKHCH/","summary":"SUSE Security Update SUSE-SU-2024:4276-1 vom 2024-12-10","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YTZ2WGLML4Q6E3IG32UCJ6NFIDUTWN22/","summary":"SUSE Security Update SUSE-SU-2024:4275-1 vom 2024-12-10","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YTZ2WGLML4Q6E3IG32UCJ6NFIDUTWN22/","summary":"SUSE Security Update SUSE-SU-2024:4275-1 vom 2024-12-10","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7159-1","summary":"Ubuntu Security Notice USN-7159-1 vom 2024-12-12","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/SARXL66CQHD5VSFG5PUBNBVBPVFUN4KT/","summary":"SUSE Security Update SUSE-SU-2024:4314-1 vom 2024-12-13","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/S4I5Z6ALCJLHTP25U3HMJHEXN4DR2USM/","summary":"SUSE Security Update SUSE-SU-2024:4316-1 vom 2024-12-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html","summary":"SUSE Security Update SUSE-SU-2024:4318-1 vom 2024-12-13","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LQPWDP54GSTHYCV4CTCOE67D2ANVPPUW/","summary":"SUSE Security Update SUSE-SU-2024:4315-1 vom 2024-12-13","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-12884.html","summary":"Oracle Linux Security Advisory ELSA-2024-12884 vom 2024-12-17","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7179045","summary":"IBM Security Bulletin 7179045 vom 2024-12-16","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7159-2","summary":"Ubuntu Security Notice USN-7159-2 vom 2024-12-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7166-2","summary":"Ubuntu Security Notice USN-7159-2 vom 2024-12-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html","summary":"SUSE Security Update SUSE-SU-2024:4367-1 vom 2024-12-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html","summary":"SUSE Security Update SUSE-SU-2024:4364-1 vom 2024-12-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7166-1","summary":"Ubuntu Security Notice USN-7166-1 vom 2024-12-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7159-3","summary":"Ubuntu Security Notice USN-7159-2 vom 2024-12-18","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7173-1","summary":"Ubuntu Security Notice USN-7173-1 vom 2024-12-17","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-12887.html","summary":"Oracle Linux Security Advisory ELSA-2024-12887 vom 2024-12-18","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WFOJHFFEHK42VPQ6XLZWB77H5OEJ3FF4/","summary":"SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html","summary":"SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/WFOJHFFEHK42VPQ6XLZWB77H5OEJ3FF4/","summary":"SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html","summary":"SUSE Security Update SUSE-SU-2024:4387-1 vom 2024-12-19","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7159-4","summary":"Ubuntu Security Notice USN-7159-4 vom 2024-12-20","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7173-2","summary":"Ubuntu Security Notice USN-7173-2 vom 2024-12-20","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7166-3","summary":"Ubuntu Security Notice USN-7166-3 vom 2024-12-20","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html","summary":"Debian Security Advisory DLA-4008 vom 2025-01-03","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7159-5","summary":"Ubuntu Security Notice USN-7159-5 vom 2025-01-06","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7183-1","summary":"Ubuntu Security Notice USN-7183-1 vom 2025-01-06","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7186-1","summary":"Ubuntu Security Notice USN-7186-1 vom 2025-01-06","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7184-1","summary":"Ubuntu Security Notice USN-7184-1 vom 2025-01-06","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7180361","summary":"IBM Security Bulletin 7180361 vom 2025-01-07","category":"external"},{"url":"https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-24-1R2-release","summary":"Juniper Security Advisory JSA92874 vom 2024-01-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html","summary":"SUSE Security Update SUSE-SU-2025:0035-1 vom 2025-01-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html","summary":"SUSE Security Update SUSE-SU-2025:0034-1 vom 2025-01-08","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7186-2","summary":"Ubuntu Security Notice USN-7186-2 vom 2025-01-09","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7194-1","summary":"Ubuntu Security Notice USN-7194-1 vom 2025-01-09","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7185-2","summary":"Ubuntu Security Notice USN-7185-2 vom 2025-01-09","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7195-1","summary":"Ubuntu Security Notice USN-7195-1 vom 2025-01-09","category":"external"},{"url":"https://oss.oracle.com/pipermail/el-errata/2025-January/017000.html","summary":"Oracle Linux Security Advisory ELSA-2024-9315 vom 2025-01-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html","summary":"SUSE Security Update SUSE-SU-2025:0109-1 vom 2025-01-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html","summary":"SUSE Security Update SUSE-SU-2025:0101-1 vom 2025-01-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html","summary":"SUSE Security Update SUSE-SU-2025:0107-1 vom 2025-01-14","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7195-2","summary":"Ubuntu Security Notice USN-7195-2 vom 2025-01-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html","summary":"SUSE Security Update SUSE-SU-2025:0106-1 vom 2025-01-14","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YC7MKFCHLBJHUQM2SLPOGVG4DUWP2J4E/","summary":"SUSE Security Update SUSE-SU-2025:0114-1 vom 2025-01-15","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VK2D63Q2FKHJWXOLVAS7HPIWURVL3MQQ/","summary":"SUSE Security Update SUSE-SU-2025:0115-1 vom 2025-01-15","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/PLWCG227VUGPKNXHW6FOCW727UUPVLLU/","summary":"SUSE Security Update SUSE-SU-2025:0110-1 vom 2025-01-15","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7173-3","summary":"Ubuntu Security Notice USN-7173-3 vom 2025-01-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html","summary":"SUSE Security Update SUSE-SU-2025:0117-1 vom 2025-01-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html","summary":"SUSE Security Update SUSE-SU-2025:0124-1 vom 2025-01-15","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/NVEFJ5TKVGVJIR3Y7Y6XQIAGC5P5TTK7/","summary":"SUSE Security Update SUSE-SU-2025:0131-1 vom 2025-01-15","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/C6ANXHEO54VUUFEWI6QYB2M3L2SS7OOW/","summary":"SUSE Security Update SUSE-SU-2025:0146-1 vom 2025-01-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YHBMZ4MND2ONRG4N26VJNJGAZBXMYEDV/","summary":"SUSE Security Update SUSE-SU-2025:0137-1 vom 2025-01-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/USHZQFRYGMLVCVQRQLPH4FARDBDAEC6G/","summary":"SUSE Security Update SUSE-SU-2025:0150-1 vom 2025-01-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/ET3TDUWYDTZV554NRC7LB5HGM4TCIIGZ/","summary":"SUSE Security Update SUSE-SU-2025:0138-1 vom 2025-01-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html","summary":"SUSE Security Update SUSE-SU-2025:0154-1 vom 2025-01-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html","summary":"SUSE Security Update SUSE-SU-2025:0153-1 vom 2025-01-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html","summary":"SUSE Security Update SUSE-SU-2025:0164-1 vom 2025-01-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html","summary":"SUSE Security Update SUSE-SU-2025:0158-1 vom 2025-01-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020170.html","summary":"SUSE Security Update SUSE-SU-2025:0187-1 vom 2025-01-20","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YFCZRPOJ45QWVUSJAEK53OBSFTOQ3W5H/","summary":"SUSE Security Update SUSE-SU-2025:0201-1 vom 2025-01-21","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YNU4IXTEAXCI7QNPC2AVXZICYTGC4XXI/","summary":"SUSE Security Update SUSE-SU-2025:0238-1 vom 2025-01-27","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VBKJOKHJGUZRHPVCGSRZVBF6ZMI7KJY7/","summary":"SUSE Security Update SUSE-SU-2025:0239-1 vom 2025-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html","summary":"SUSE Security Update SUSE-SU-2025:0236-1 vom 2025-01-24","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YCBYAV5OJRXD362FDCZUSIHNHOURONCF/","summary":"SUSE Security Update SUSE-SU-2025:0240-1 vom 2025-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html","summary":"SUSE Security Update SUSE-SU-2025:0253-1 vom 2025-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html","summary":"SUSE Security Update SUSE-SU-2025:0261-1 vom 2025-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html","summary":"SUSE Security Update SUSE-SU-2025:0260-1 vom 2025-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html","summary":"SUSE Security Update SUSE-SU-2025:0264-1 vom 2025-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html","summary":"SUSE Security Update SUSE-SU-2025:0251-1 vom 2025-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020212.html","summary":"SUSE Security Update SUSE-SU-2025:0255-1 vom 2025-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020213.html","summary":"SUSE Security Update SUSE-SU-2025:0254-1 vom 2025-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html","summary":"SUSE Security Update SUSE-SU-2025:0249-1 vom 2025-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html","summary":"SUSE Security Update SUSE-SU-2025:0266-1 vom 2025-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html","summary":"SUSE Security Update SUSE-SU-2025:0252-1 vom 2025-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html","summary":"SUSE Security Update SUSE-SU-2025:0248-1 vom 2025-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html","summary":"SUSE Security Update SUSE-SU-2025:0244-1 vom 2025-01-27","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7181933","summary":"IBM Security Bulletin 7181933 vom 2025-01-29","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html","summary":"SUSE Security Update SUSE-SU-2025:0289-1 vom 2025-01-29","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-196.html","summary":"Amazon Linux Security Advisory ALASLIVEPATCH-2025-196 vom 2025-02-04","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-198.html","summary":"Amazon Linux Security Advisory ALASLIVEPATCH-2025-198 vom 2025-02-04","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-195.html","summary":"Amazon Linux Security Advisory ALASLIVEPATCH-2025-195 vom 2025-02-04","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-197.html","summary":"Amazon Linux Security Advisory ALASLIVEPATCH-2025-197 vom 2025-02-04","category":"external"},{"url":"https://lists.debian.org/debian-security-announce/2025/msg00023.html","summary":"Debian Security Advisory DSA-5860 vom 2025-02-08","category":"external"},{"url":"https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25398","summary":"Brocade Security Advisory BSA-2025-2895 vom 2025-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-February/020352.html","summary":"SUSE Security Update SUSE-SU-2025:0556-1 vom 2025-02-14","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:1658","summary":"Red Hat Security Advisory RHSA-2025:1658 vom 2025-02-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-February/020370.html","summary":"SUSE Security Update SUSE-SU-2025:0577-1 vom 2025-02-18","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html","summary":"Debian Security Advisory DLA-4076 vom 2025-03-01","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html","summary":"Debian Security Advisory DLA-4075 vom 2025-03-01","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:2270","summary":"Red Hat Security Advisory RHSA-2025:2270 vom 2025-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:1912","summary":"Red Hat Security Advisory RHSA-2025:1912 vom 2025-03-05","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7332-1","summary":"Ubuntu Security Notice USN-7332-1 vom 2025-03-05","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7185244","summary":"IBM Security Bulletin 7185244 vom 2025-03-10","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-20152.html","summary":"Oracle Linux Security Advisory ELSA-2025-20152 vom 2025-03-11","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7342-1","summary":"Ubuntu Security Notice USN-7342-1 vom 2025-03-11","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7344-1","summary":"Ubuntu Security Notice USN-7344-1 vom 2025-03-11","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7332-2","summary":"Ubuntu Security Notice USN-7332-2 vom 2025-03-11","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html","summary":"SUSE Security Update SUSE-SU-2025:0201-2 vom 2025-03-11","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-March/020500.html","summary":"SUSE Security Update SUSE-SU-2025:0577-2 vom 2025-03-11","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7332-3","summary":"Ubuntu Security Notice USN-7332-3 vom 2025-03-13","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7344-2","summary":"Ubuntu Security Notice USN-7344-2 vom 2025-03-13","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-082.html","summary":"Amazon Linux Security Advisory ALASKERNEL-5.10-2025-082 vom 2025-03-14","category":"external"},{"url":"https://github.com/alleleintel/research/tree/master/CVE-2024-36904/","summary":"PoC auf GitHub vom 2025-03-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7388-1","summary":"Ubuntu Security Notice USN-7388-1 vom 2025-03-27","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7387-1","summary":"Ubuntu Security Notice USN-7387-1 vom 2025-03-27","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7389-1","summary":"Ubuntu Security Notice USN-7389-1 vom 2025-03-28","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7390-1","summary":"Ubuntu Security Notice USN-7390-1 vom 2025-03-28","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7387-2","summary":"Ubuntu Security Notice USN-7387-2 vom 2025-03-28","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7387-3","summary":"Ubuntu Security Notice USN-7387-3 vom 2025-03-28","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7407-1","summary":"Ubuntu Security Notice USN-7407-1 vom 2025-04-02","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7413-1","summary":"Ubuntu Security Notice USN-7413-1 vom 2025-04-03","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7421-1","summary":"Ubuntu Security Notice USN-7421-1 vom 2025-04-07","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7230557","summary":"IBM Security Bulletin 7230557 vom 2025-04-10","category":"external"},{"url":"https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-24-1R2-release?language=en_US","summary":"Juniper Security Bulletin","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:3935","summary":"Red Hat Security Advisory RHSA-2025:3935 vom 2025-04-16","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7458-1","summary":"Ubuntu Security Notice USN-7458-1 vom 2025-04-24","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7459-1","summary":"Ubuntu Security Notice USN-7459-1 vom 2025-04-24","category":"external"},{"url":"https://lists.debian.org/debian-security-announce/2025/msg00069.html","summary":"Debian Security Advisory DSA-5907 vom 2025-04-27","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7459-2","summary":"Ubuntu Security Notice USN-7459-2 vom 2025-04-28","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7496-1","summary":"Ubuntu Security Notice USN-7496-1 vom 2025-05-07","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7496-2","summary":"Ubuntu Security Notice USN-7496-2 vom 2025-05-07","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7496-5","summary":"Ubuntu Security Notice USN-7496-5 vom 2025-05-07","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7496-4","summary":"Ubuntu Security Notice USN-7496-4 vom 2025-05-07","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7496-3","summary":"Ubuntu Security Notice USN-7496-3 vom 2025-05-07","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-20319.html","summary":"Oracle Linux Security Advisory ELSA-2025-20319 vom 2025-05-12","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7506-3","summary":"Ubuntu Security Notice USN-7506-3 vom 2025-05-12","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7506-1","summary":"Ubuntu Security Notice USN-7506-1 vom 2025-05-12","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7506-2","summary":"Ubuntu Security Notice USN-7506-2 vom 2025-05-12","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7506-4","summary":"Ubuntu Security Notice USN-7506-4 vom 2025-05-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:6966","summary":"Red Hat Security Advisory RHSA-2025:6966 vom 2025-05-13","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7233232","summary":"IBM Security Bulletin 7233232 vom 2025-05-13","category":"external"},{"url":"https://lists.debian.org/debian-security-announce/2025/msg00088.html","summary":"Debian Security Advisory DSA-5925 vom 2025-05-24","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html","summary":"Debian Security Advisory DLA-4178 vom 2025-05-26","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-072.html","summary":"Amazon Linux Security Advisory ALASKERNEL-5.15-2025-072 vom 2025-05-29","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html","summary":"Debian Security Advisory DLA-4193 vom 2025-05-30","category":"external"},{"url":"https://www.dell.com/support/kbdoc/de-de/000326299/dsa-2025-213-security-update-for-dell-avamar-dell-networker-virtual-edition-nve-and-dell-powerprotect-dp-series-appliance-dell-integrated-data-protection-appliance-idpa-multiple-third-party-vulnerabilities","summary":"Dell Security Advisory DSA-2025-213 vom 2025-05-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html","summary":"SUSE Security Update SUSE-SU-2025:20249-1 vom 2025-06-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html","summary":"SUSE Security Update SUSE-SU-2025:20246-1 vom 2025-06-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html","summary":"SUSE Security Update SUSE-SU-2025:20247-1 vom 2025-06-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html","summary":"SUSE Security Update SUSE-SU-2025:20248-1 vom 2025-06-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html","summary":"SUSE Security Update SUSE-SU-2025:20164-1 vom 2025-06-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021174.html","summary":"SUSE Security Update SUSE-SU-2025:20165-1 vom 2025-06-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html","summary":"SUSE Security Update SUSE-SU-2025:20166-1 vom 2025-06-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html","summary":"SUSE Security Update SUSE-SU-2025:20163-1 vom 2025-06-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021403.html","summary":"SUSE Security Update SUSE-SU-2025:20008-1 vom 2025-06-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html","summary":"SUSE Security Update SUSE-SU-2025:20073-1 vom 2025-06-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html","summary":"SUSE Security Update SUSE-SU-2025:20028-1 vom 2025-06-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html","summary":"SUSE Security Update SUSE-SU-2025:20047-1 vom 2025-06-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html","summary":"SUSE Security Update SUSE-SU-2025:20077-1 vom 2025-06-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html","summary":"SUSE Security Update SUSE-SU-2025:20044-1 vom 2025-06-04","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-073.html","summary":"Amazon Linux Security Advisory ALASKERNEL-5.15-2025-073 vom 2025-06-10","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7236043","summary":"IBM Security Bulletin 7236043 vom 2025-06-09","category":"external"},{"url":"https://security.netapp.com/advisory/NTAP-20240905-0010","summary":"NetApp Security Advisory NTAP-20240905-0010 vom 2025-06-11","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:8796","summary":"Red Hat Security Advisory RHSA-2025:8796 vom 2025-06-11","category":"external"},{"url":"https://security.netapp.com/advisory/NTAP-20240905-0005","summary":"NetApp Security Advisory NTAP-20240905-0005 vom 2025-06-11","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7591-3","summary":"Ubuntu Security Notice USN-7591-3 vom 2025-06-24","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7591-2","summary":"Ubuntu Security Notice USN-7591-2 vom 2025-06-24","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7591-1","summary":"Ubuntu Security Notice USN-7591-1 vom 2025-06-24","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7593-1","summary":"Ubuntu Security Notice USN-7593-1 vom 2025-06-24","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7592-1","summary":"Ubuntu Security Notice USN-7592-1 vom 2025-06-24","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7591-4","summary":"Ubuntu Security Notice USN-7591-4 vom 2025-06-24","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7597-2","summary":"Ubuntu Security Notice USN-7597-2 vom 2025-06-24","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7597-1","summary":"Ubuntu Security Notice USN-7597-1 vom 2025-06-24","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7598-1","summary":"Ubuntu Security Notice USN-7598-1 vom 2025-06-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:9584","summary":"Red Hat Security Advisory RHSA-2025:9584 vom 2025-06-25","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7602-1","summary":"Ubuntu Security Notice USN-7602-1 vom 2025-06-26","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7236419","summary":"IBM Security Bulletin 7236419 vom 2025-06-30","category":"external"},{"url":"https://documentation.solarwinds.com/en/success_center/sem/content/release_notes/sem_2025-2-1_release_notes.htm","summary":"SEM 2025.2.1 release notes vom 2025-07-02","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7591-5","summary":"Ubuntu Security Notice USN-7591-5 vom 2025-07-04","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-20406.html","summary":"Oracle Linux Security Advisory ELSA-2025-20406 vom 2025-07-08","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:10701","summary":"Red Hat Security Advisory RHSA-2025:10701 vom 2025-07-09","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-20470.html","summary":"Oracle Linux Security Advisory ELSA-2025-20470 vom 2025-07-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-July/021829.html","summary":"SUSE Security Update SUSE-SU-2025:02334-1 vom 2025-07-16","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7591-6","summary":"Ubuntu Security Notice USN-7591-6 vom 2025-07-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7654-1","summary":"Ubuntu Security Notice USN-7654-1 vom 2025-07-18","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7654-2","summary":"Ubuntu Security Notice USN-7654-2 vom 2025-07-18","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7654-3","summary":"Ubuntu Security Notice USN-7654-3 vom 2025-07-18","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7655-1","summary":"Ubuntu Security Notice USN-7655-1 vom 2025-07-18","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7654-4","summary":"Ubuntu Security Notice USN-7654-4 vom 2025-07-22","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7654-5","summary":"Ubuntu Security Notice USN-7654-5 vom 2025-07-29","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7686-1","summary":"Ubuntu Security Notice USN-7686-1 vom 2025-08-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:13135","summary":"Red Hat Security Advisory RHSA-2025:13135 vom 2025-08-06","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html","summary":"Debian Security Advisory DLA-4271 vom 2025-08-13","category":"external"},{"url":"https://lists.debian.org/debian-security-announce/2025/msg00137.html","summary":"Debian Security Advisory DSA-5973 vom 2025-08-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022200.html","summary":"SUSE Security Update SUSE-SU-2025:02853-1 vom 2025-08-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022237.html","summary":"SUSE Security Update SUSE-SU-2025:02923-1 vom 2025-08-20","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7711-1","summary":"Ubuntu Security Notice USN-7711-1 vom 2025-08-22","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7712-1","summary":"Ubuntu Security Notice USN-7712-1 vom 2025-08-22","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022259.html","summary":"SUSE Security Update SUSE-SU-2025:02969-1 vom 2025-08-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html","summary":"SUSE Security Update SUSE-SU-2025:02996-1 vom 2025-08-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022283.html","summary":"SUSE Security Update SUSE-SU-2025:02997-1 vom 2025-08-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022295.html","summary":"SUSE Security Update SUSE-SU-2025:20586-1 vom 2025-08-28","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html","summary":"SUSE Security Update SUSE-SU-2025:20577-1 vom 2025-08-28","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022327.html","summary":"SUSE Security Update SUSE-SU-2025:03011-1 vom 2025-08-28","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022329.html","summary":"SUSE Security Update SUSE-SU-2025:03023-1 vom 2025-08-29","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022362.html","summary":"SUSE Security Update SUSE-SU-2025:20602-1 vom 2025-08-29","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:15016","summary":"Red Hat Security Advisory RHSA-2025:15016 vom 2025-09-02","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7712-2","summary":"Ubuntu Security Notice USN-7712-2 vom 2025-09-02","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-20553.html","summary":"Oracle Linux Security Advisory ELSA-2025-20553 vom 2025-09-10","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html","summary":"Debian Security Advisory DLA-4328 vom 2025-10-13","category":"external"},{"url":"https://www.dell.com/support/kbdoc/000385435","summary":"Dell Security Advisory DSA-2025-404 vom 2025-10-31","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7256201","summary":"IBM Security Bulletin 7256201 vom 2026-01-05","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html","summary":"SUSE Security Update SUSE-SU-2026:0263-1 vom 2026-01-23","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html","summary":"SUSE Security Update SUSE-SU-2026:0317-1 vom 2026-01-29","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2026/02/msg00016.html","summary":"Debian Security Advisory DLA-4475 vom 2026-02-11","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html","summary":"SUSE Security Update SUSE-SU-2026:0473-1 vom 2026-02-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html","summary":"SUSE Security Update SUSE-SU-2026:20291-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html","summary":"SUSE Security Update SUSE-SU-2026:20330-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024173.html","summary":"SUSE Security Update SUSE-SU-2026:20322-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html","summary":"SUSE Security Update SUSE-SU-2026:20324-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024176.html","summary":"SUSE Security Update SUSE-SU-2026:20319-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html","summary":"SUSE Security Update SUSE-SU-2026:20283-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024199.html","summary":"SUSE Security Update SUSE-SU-2026:20285-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html","summary":"SUSE Security Update SUSE-SU-2026:20320-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html","summary":"SUSE Security Update SUSE-SU-2026:20323-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html","summary":"SUSE Security Update SUSE-SU-2026:20292-1 vom 2026-02-13","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-50145.html","summary":"Oracle Linux Security Advisory ELSA-2026-50145 vom 2026-03-12","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8096-2","summary":"Ubuntu Security Notice USN-8096-2 vom 2026-03-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8096-1","summary":"Ubuntu Security Notice USN-8096-1 vom 2026-03-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8096-3","summary":"Ubuntu Security Notice USN-8096-3 vom 2026-03-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8096-4","summary":"Ubuntu Security Notice USN-8096-4 vom 2026-03-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8116-1","summary":"Ubuntu Security Notice USN-8116-1 vom 2026-03-23","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8096-5","summary":"Ubuntu Security Notice USN-8096-5 vom 2026-03-23","category":"external"},{"url":"https://oss.oracle.com/pipermail/el-errata/2026-March/020110.html","summary":"Oracle Linux Security Advisory ELSA-2026-50171 vom 2026-03-31","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8141-1","summary":"Ubuntu Security Notice USN-8141-1 vom 2026-04-01","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8163-1","summary":"Ubuntu Security Notice USN-8163-1 vom 2026-04-10","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8163-2","summary":"Ubuntu Security Notice USN-8163-2 vom 2026-04-14","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://lore.kernel.org/","published":"2024-05-30","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://lore.kernel.org/","added":"2026-04-13T00:00:00.000Z","public_url":"https://lore.kernel.org/","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-w-2024-1259 cve-2023-52881 linux kernel: mehrere schwachstellen ermöglichen denial of service und unspezifischen angriff bsi bsi","public_published":"2024-05-30","public_updated":"2026-04-13","public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13"},{"id":"BSI:WID-SEC-W-2026-0818","cve":"CVE-2026-33343","title":"etcd: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen","date":"2026-03-22","published":"2026-03-22","updated":"2026-04-13","source_published":"2026-03-22","source_updated":"2026-04-13","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://github.com/advisories/GHSA-q8m4-xhhv-38mg","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0818.json","summary":"WID-SEC-W-2026-0818 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0818","summary":"WID-SEC-2026-0818 - Portal Version","category":"self"},{"url":"https://github.com/advisories/GHSA-q8m4-xhhv-38mg","summary":"GitHub Advisory Database vom 2026-03-22","category":"external"},{"url":"https://github.com/advisories/GHSA-rfx7-8w68-q57q","summary":"GitHub Advisory Database vom 2026-03-22","category":"external"},{"url":"https://www.strix.ai/blog/where-others-missed-it-etcd-auth-bypass","summary":"PoC CVE-2026-33413 vom 2026-04-12","category":"external"}],"severity":"high","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://github.com/advisories/GHSA-q8m4-xhhv-38mg","published":"2026-03-22","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"fastlane_seen_at":"2026-04-14T22:16:17.049Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://github.com/advisories/GHSA-q8m4-xhhv-38mg","added":"2026-04-13T00:00:00.000Z","public_url":"https://github.com/advisories/GHSA-q8m4-xhhv-38mg","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-w-2026-0818 cve-2026-33343 etcd: mehrere schwachstellen ermöglichen umgehen von sicherheitsvorkehrungen bsi bsi","public_published":"2026-03-22","public_updated":"2026-04-13","public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13"},{"id":"BSI:WID-SEC-W-2026-0870","cve":"CVE-2026-33416","title":"libpng: Mehrere Schwachstellen","date":"2026-03-25","published":"2026-03-25","updated":"2026-04-13","source_published":"2026-03-25","source_updated":"2026-04-13","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://seclists.org/oss-sec/2026/q1/387","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0870.json","summary":"WID-SEC-W-2026-0870 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0870","summary":"WID-SEC-2026-0870 - Portal Version","category":"self"},{"url":"https://seclists.org/oss-sec/2026/q1/387","summary":"OSS Security Mailing List vom 2026-03-25","category":"external"},{"url":"https://github.com/pnggroup/libpng/security/advisories/GHSA-m4pc-p4q3-4c7j","summary":"libpng GitHub vom 2026-03-25","category":"external"},{"url":"https://github.com/pnggroup/libpng/security/advisories/GHSA-WJR5-C57X-95M2","summary":"libpng GitHub vom 2026-03-25","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BW7FXXY3UCNLQ5X4KG3NSGMFBE7B3G2R/","summary":"openSUSE Security Update OPENSUSE-SU-2026:10451-1 vom 2026-03-31","category":"external"},{"url":"https://lists.debian.org/debian-security-announce/2026/msg00098.html","summary":"Debian Security Advisory DSA-6189 vom 2026-03-31","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-2026-c6c617fe35","summary":"Fedora Security Advisory FEDORA-2026-C6C617FE35 vom 2026-04-07","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2026/04/msg00001.html","summary":"Debian Security Advisory DLA-4521 vom 2026-04-02","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-2026-ba18a54554","summary":"Fedora Security Advisory FEDORA-2026-BA18A54554 vom 2026-04-07","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-2026-67c20bfb74","summary":"Fedora Security Advisory FEDORA-2026-67C20BFB74 vom 2026-04-07","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3PYSKYKCP5UVHUBF6G52O6GPIKOALANG/","summary":"openSUSE Security Update OPENSUSE-SU-2026:20466-1 vom 2026-04-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-April/025224.html","summary":"SUSE Security Update SUSE-SU-2026:21000-1 vom 2026-04-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:7672","summary":"Red Hat Security Advisory RHSA-2026:7672 vom 2026-04-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:7671","summary":"Red Hat Security Advisory RHSA-2026:7671 vom 2026-04-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-April/025274.html","summary":"SUSE Security Update SUSE-SU-2026:21067-1 vom 2026-04-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-April/025302.html","summary":"SUSE Security Update SUSE-SU-2026:21038-1 vom 2026-04-13","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2-2026-3243.html","summary":"Amazon Linux Security Advisory ALAS2-2026-3243 vom 2026-04-14","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2-2026-3244.html","summary":"Amazon Linux Security Advisory ALAS2-2026-3244 vom 2026-04-14","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:8052","summary":"Red Hat Security Advisory RHSA-2026:8052 vom 2026-04-14","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://seclists.org/oss-sec/2026/q1/387","published":"2026-03-25","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"fastlane_seen_at":"2026-04-14T18:01:34.363Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://seclists.org/oss-sec/2026/q1/387","added":"2026-04-13T00:00:00.000Z","public_url":"https://seclists.org/oss-sec/2026/q1/387","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-w-2026-0870 cve-2026-33416 libpng: mehrere schwachstellen bsi bsi","public_published":"2026-03-25","public_updated":"2026-04-13","public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13"},{"id":"BSI:WID-SEC-W-2026-0997","cve":"CVE-2026-5731","title":"Mozilla Firefox und Thunderbird: Mehrere Schwachstellen","date":"2026-04-07","published":"2026-04-07","updated":"2026-04-13","source_published":"2026-04-07","source_updated":"2026-04-13","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2026-25/","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0997.json","summary":"WID-SEC-W-2026-0997 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0997","summary":"WID-SEC-2026-0997 - Portal Version","category":"self"},{"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2026-25/","summary":"Mozilla Security Advisory MFSA 2026-25 Security Vulnerabilities fixed in Firefox 149.0.2 vom 2026-04-07","category":"external"},{"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2026-26/","summary":"Mozilla Security Advisory MFSA 2026-26 Security Vulnerabilities fixed in Firefox ESR 115.34.1 vom 2026-04-07","category":"external"},{"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2026-27/","summary":"Mozilla Security Advisory MFSA 2026-27 Security Vulnerabilities fixed in Firefox ESR 140.9.1 vom 2026-04-07","category":"external"},{"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2026-28/","summary":"Mozilla Security Advisory MFSA 2026-28 Security Vulnerabilities fixed in Thunderbird 149.0.2 vom 2026-04-07","category":"external"},{"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2026-29/","summary":"Mozilla Security Advisory MFSA 2026-29 Security Vulnerabilities fixed in Thunderbird 140.9.1 vom 2026-04-07","category":"external"},{"url":"https://lists.debian.org/debian-security-announce/2026/msg00112.html","summary":"Debian Security Advisory DSA-6202 vom 2026-04-08","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PTRDAEGUXD3AWAVJMNQHBTJSF46GEBLX/","summary":"openSUSE Security Update OPENSUSE-SU-2026:10503-1 vom 2026-04-09","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JEKBDG6VTF2J5KBSXUAZRCQ3BDEUDKVP/","summary":"openSUSE Security Update OPENSUSE-SU-2026:10501-1 vom 2026-04-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-April/025239.html","summary":"SUSE Security Update SUSE-SU-2026:1273-1 vom 2026-04-13","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X6WL4U6AU6GMCZNA7F2AJWYXB7HS5TV7/","summary":"openSUSE Security Update OPENSUSE-SU-2026:10511-1 vom 2026-04-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:7671","summary":"Red Hat Security Advisory RHSA-2026:7671 vom 2026-04-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:7672","summary":"Red Hat Security Advisory RHSA-2026:7672 vom 2026-04-13","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2026/04/msg00005.html","summary":"Debian Security Advisory DLA-4526 vom 2026-04-11","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-7671.html","summary":"Oracle Linux Security Advisory ELSA-2026-7671 vom 2026-04-13","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-7672.html","summary":"Oracle Linux Security Advisory ELSA-2026-7672 vom 2026-04-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:8052","summary":"Red Hat Security Advisory RHSA-2026:8052 vom 2026-04-14","category":"external"}],"severity":"high","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2026-25/","published":"2026-04-07","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-14T18:01:34.363Z","sourceUrl":"https://www.mozilla.org/en-US/security/advisories/mfsa2026-25/","added":"2026-04-13T00:00:00.000Z","public_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2026-25/","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-w-2026-0997 cve-2026-5731 mozilla firefox und thunderbird: mehrere schwachstellen bsi bsi","public_published":"2026-04-07","public_updated":"2026-04-13","public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13"},{"id":"BSI:WID-SEC-W-2026-1068","cve":"CVE-2020-9693","title":"Adobe Acrobat und Acrobat Reader: Mehrere Schwachstellen","date":"2020-08-11","published":"2020-08-11","updated":"2026-04-13","source_published":"2020-08-11","source_updated":"2026-04-13","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://helpx.adobe.com/security/products/acrobat/apsb20-48.html","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2020/wid-sec-w-2026-1068.json","summary":"WID-SEC-W-2026-1068 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1068","summary":"WID-SEC-2026-1068 - Portal Version","category":"self"},{"url":"https://helpx.adobe.com/security/products/acrobat/apsb20-48.html","summary":"Adobe Security Bulletin: APSB20-48 vom 2020-08-11","category":"external"},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog","summary":"CISA Known Exploited Vulnerabilities Catalog vom 2026-04-13","category":"external"}],"severity":"high","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://helpx.adobe.com/security/products/acrobat/apsb20-48.html","published":"2020-08-11","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-14T09:00:56.117Z","sourceUrl":"https://helpx.adobe.com/security/products/acrobat/apsb20-48.html","added":"2026-04-13T00:00:00.000Z","public_url":"https://helpx.adobe.com/security/products/acrobat/apsb20-48.html","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-w-2026-1068 cve-2020-9693 adobe acrobat und acrobat reader: mehrere schwachstellen bsi bsi","public_published":"2020-08-11","public_updated":"2026-04-13","public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13"},{"id":"BSI:WID-SEC-W-2026-1088","cve":"CVE-2026-31414","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-04-13","published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":"2026-04-13","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://lore.kernel.org/linux-cve-announce/","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1088.json","summary":"WID-SEC-W-2026-1088 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1088","summary":"WID-SEC-2026-1088 - Portal Version","category":"self"},{"url":"https://lore.kernel.org/linux-cve-announce/","summary":"Kernel CVE Announce Mailingliste","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026041308-CVE-2026-31414-90e7@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-31414","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026041310-CVE-2026-31415-f7e1@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-31415","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026041310-CVE-2026-31416-9c4a@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-31416","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026041310-CVE-2026-31417-d47b@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-31417","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026041311-CVE-2026-31418-e6b9@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-31418","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026041353-CVE-2026-31419-e176@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-31419","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026041355-CVE-2026-31420-f7b0@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-31420","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026041355-CVE-2026-31421-78d7@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-31421","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026041356-CVE-2026-31422-04eb@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-31422","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026041356-CVE-2026-31423-ed66@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-31423","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026041356-CVE-2026-31424-704f@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-31424","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026041357-CVE-2026-31425-40d3@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-31425","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026041357-CVE-2026-31426-bfb3@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-31426","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026041357-CVE-2026-31427-1afe@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-31427","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026041358-CVE-2026-31428-20a2@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-31428","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://lore.kernel.org/linux-cve-announce/","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"fastlane_seen_at":"2026-04-14T12:00:54.101Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://lore.kernel.org/linux-cve-announce/","added":"2026-04-13T00:00:00.000Z","public_url":"https://lore.kernel.org/linux-cve-announce/","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-w-2026-1088 cve-2026-31414 linux kernel: mehrere schwachstellen bsi bsi","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13"},{"id":"BSI:WID-SEC-W-2026-1089","cve":"CVE-2026-40104","title":"xwiki: Mehrere Schwachstellen","date":"2026-04-13","published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":"2026-04-13","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-mrqg-xmgm-rc5g","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1089.json","summary":"WID-SEC-W-2026-1089 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1089","summary":"WID-SEC-2026-1089 - Portal Version","category":"self"},{"url":"https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-mrqg-xmgm-rc5g","summary":"GitHub Security Advisory GHSA-mrqg-xmgm-rc5g vom 2026-04-13","category":"external"},{"url":"https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-w4fj-87j5-f25c","summary":"GitHub Security Advisory GHSA-w4fj-87j5-f25c vom 2026-04-13","category":"external"}],"severity":"high","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-mrqg-xmgm-rc5g","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"fastlane_seen_at":"2026-04-14T22:16:17.049Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-mrqg-xmgm-rc5g","added":"2026-04-13T00:00:00.000Z","public_url":"https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-mrqg-xmgm-rc5g","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-w-2026-1089 cve-2026-40104 xwiki: mehrere schwachstellen bsi bsi","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13"},{"id":"BSI:WID-SEC-W-2026-1090","cve":"CVE-2026-33892","title":"Siemens Industrial Edge Management: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen","date":"2026-04-13","published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":"2026-04-13","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://cert-portal.siemens.com/productcert/html/ssa-609469.html","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1090.json","summary":"WID-SEC-W-2026-1090 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1090","summary":"WID-SEC-2026-1090 - Portal Version","category":"self"},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-609469.html","summary":"Siemens Security Advisory by Siemens ProductCERT vom 2026-04-13","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://cert-portal.siemens.com/productcert/html/ssa-609469.html","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"fastlane_seen_at":"2026-04-14T22:16:17.049Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://cert-portal.siemens.com/productcert/html/ssa-609469.html","added":"2026-04-13T00:00:00.000Z","public_url":"https://cert-portal.siemens.com/productcert/html/ssa-609469.html","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-w-2026-1090 cve-2026-33892 siemens industrial edge management: schwachstelle ermöglicht umgehen von sicherheitsvorkehrungen bsi bsi","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13"},{"id":"CVE-2026-23468","cve":"CVE-2026-23468","title":"drm/amdgpu: Limit BO list entry count to prevent resource exhaustion","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-03","date":"2026-04-03","updated":"2026-04-13","date_basis":"msrc_cve","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://www.cve.org/CVERecord?id=CVE-2026-23468","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23468","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23468","published":"2026-04-14","updated":"2026-04-14","checked_at":"2026-04-16T13:31:21.070Z","status_ok":null,"source_kind":"vendor","confidence":0.9},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-23468","published":"2026-04-03","updated":"2026-04-13","checked_at":"2026-04-16T13:31:21.070Z","status_ok":true,"source_kind":"msrc_cve","confidence":0.99}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":"2026-04-03","cve_updated":"2026-04-13","link_checked_at":"2026-04-16T13:31:21.070Z","published_at":"2026-04-03","updated_at":"2026-04-13","sourceUrl":"https://www.cve.org/CVERecord?id=CVE-2026-23468","added":"2026-04-13T00:00:00.000Z","public_url":"https://www.cve.org/CVERecord?id=CVE-2026-23468","public_source":"CVE","public_source_slug":"cve","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-23468 cve-2026-23468 drm/amdgpu: limit bo list entry count to prevent resource exhaustion microsoft cve msrc","public_published":"2026-04-03","public_updated":"2026-04-13","public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13"},{"id":"CVE-2026-23473","cve":"CVE-2026-23473","title":"io_uring/poll: fix multishot recv missing EOF on wakeup race","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-03","date":"2026-04-03","updated":"2026-04-13","date_basis":"msrc_cve","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://www.cve.org/CVERecord?id=CVE-2026-23473","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23473","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23473","published":"2026-04-14","updated":"2026-04-14","checked_at":"2026-04-16T13:31:20.900Z","status_ok":null,"source_kind":"vendor","confidence":0.9},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-23473","published":"2026-04-03","updated":"2026-04-13","checked_at":"2026-04-16T13:31:20.900Z","status_ok":true,"source_kind":"msrc_cve","confidence":0.99}],"exploited":false,"severity":"medium","cvss":4.7,"cve_published":"2026-04-03","cve_updated":"2026-04-13","link_checked_at":"2026-04-16T13:31:20.900Z","published_at":"2026-04-03","updated_at":"2026-04-13","sourceUrl":"https://www.cve.org/CVERecord?id=CVE-2026-23473","added":"2026-04-13T00:00:00.000Z","public_url":"https://www.cve.org/CVERecord?id=CVE-2026-23473","public_source":"CVE","public_source_slug":"cve","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-23473 cve-2026-23473 io_uring/poll: fix multishot recv missing eof on wakeup race microsoft cve msrc","public_published":"2026-04-03","public_updated":"2026-04-13","public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13"},{"id":"CVE-2026-31394","cve":"CVE-2026-31394","title":"mac80211: fix crash in ieee80211_chan_bw_change for AP_VLAN stations","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-03","date":"2026-04-03","updated":"2026-04-13","date_basis":"msrc_cve","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://www.cve.org/CVERecord?id=CVE-2026-31394","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31394","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31394","published":"2026-04-14","updated":"2026-04-14","checked_at":"2026-04-16T13:31:20.994Z","status_ok":null,"source_kind":"vendor","confidence":0.9},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-31394","published":"2026-04-03","updated":"2026-04-13","checked_at":"2026-04-16T13:31:20.994Z","status_ok":true,"source_kind":"msrc_cve","confidence":0.99}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":"2026-04-03","cve_updated":"2026-04-13","link_checked_at":"2026-04-16T13:31:20.994Z","published_at":"2026-04-03","updated_at":"2026-04-13","sourceUrl":"https://www.cve.org/CVERecord?id=CVE-2026-31394","added":"2026-04-13T00:00:00.000Z","public_url":"https://www.cve.org/CVERecord?id=CVE-2026-31394","public_source":"CVE","public_source_slug":"cve","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-31394 cve-2026-31394 mac80211: fix crash in ieee80211_chan_bw_change for ap_vlan stations microsoft cve msrc","public_published":"2026-04-03","public_updated":"2026-04-13","public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13"},{"id":"CVE-2026-31407","cve":"CVE-2026-31407","title":"netfilter: conntrack: add missing netlink policy validations","source_published":"2026-04-14","source_updated":"2026-04-13","source_doc_published":"2026-04-14","source_doc_updated":null,"published":"2026-04-06","date":"2026-04-06","updated":"2026-04-13","date_basis":"msrc_cve","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://www.cve.org/CVERecord?id=CVE-2026-31407","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31407","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31407","published":"2026-04-14","updated":"2026-04-13","checked_at":"2026-04-16T13:31:31.047Z","status_ok":null,"source_kind":"vendor","confidence":0.92},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-31407","published":"2026-04-06","updated":"2026-04-13","checked_at":"2026-04-16T13:31:31.233Z","status_ok":true,"source_kind":"msrc_cve","confidence":0.99}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":"2026-04-06","cve_updated":"2026-04-13","published_at":"2026-04-06","updated_at":"2026-04-13","link_checked_at":"2026-04-16T13:31:31.233Z","sourceUrl":"https://www.cve.org/CVERecord?id=CVE-2026-31407","added":"2026-04-13T00:00:00.000Z","public_url":"https://www.cve.org/CVERecord?id=CVE-2026-31407","public_source":"CVE","public_source_slug":"cve","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-31407 cve-2026-31407 netfilter: conntrack: add missing netlink policy validations microsoft cve msrc","public_published":"2026-04-06","public_updated":"2026-04-13","public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13","source_url_repaired_from":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31407"},{"id":"CVE:CVE-2012-1854","cve":"CVE-2012-1854","title":"Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability","date":"2026-04-13","vendor":"Microsoft","product":"Visual Basic for Applications (VBA)","source":"CISA-KEV","cisa_url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog","source_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-1854","severity":"high","ransomware":"Unknown","cvss":null,"exploited":true,"published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":null,"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"candidates":[{"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-1854","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"nvd","confidence":0.8}],"date_basis":"nvd","link_checked_at":null,"sourceUrl":"https://nvd.nist.gov/vuln/detail/CVE-2012-1854","added":"2026-04-13T00:00:00.000Z","public_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-1854","public_source":"CVE","public_source_slug":"cve","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve:cve-2012-1854 cve-2012-1854 microsoft visual basic for applications insecure library loading vulnerability microsoft visual basic for applications (vba) cve cisa-kev unknown","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13"},{"id":"CVE:CVE-2020-9715","cve":"CVE-2020-9715","title":"Adobe Acrobat Use-After-Free Vulnerability","date":"2026-04-13","vendor":"Adobe","product":"Acrobat","source":"CISA-KEV","cisa_url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog","source_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-9715","severity":"high","ransomware":"Unknown","cvss":null,"exploited":true,"published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":null,"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"candidates":[{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-9715","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"nvd","confidence":0.8}],"date_basis":"nvd","link_checked_at":null,"sourceUrl":"https://nvd.nist.gov/vuln/detail/CVE-2020-9715","added":"2026-04-13T00:00:00.000Z","public_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-9715","public_source":"CVE","public_source_slug":"cve","vendor_slug":"adobe","severity_norm":"high","search_text":"cve:cve-2020-9715 cve-2020-9715 adobe acrobat use-after-free vulnerability adobe acrobat cve cisa-kev unknown","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13"},{"id":"CVE:CVE-2023-21529","cve":"CVE-2023-21529","title":"Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability","date":"2026-04-13","vendor":"Microsoft","product":"Exchange Server","source":"CISA-KEV","cisa_url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog","source_url":"https://nvd.nist.gov/vuln/detail/CVE-2023-21529","severity":"high","ransomware":"Unknown","cvss":null,"exploited":true,"published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":null,"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"candidates":[{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-21529","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"nvd","confidence":0.8}],"date_basis":"nvd","link_checked_at":null,"sourceUrl":"https://nvd.nist.gov/vuln/detail/CVE-2023-21529","added":"2026-04-13T00:00:00.000Z","public_url":"https://nvd.nist.gov/vuln/detail/CVE-2023-21529","public_source":"CVE","public_source_slug":"cve","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve:cve-2023-21529 cve-2023-21529 microsoft exchange server deserialization of untrusted data vulnerability microsoft exchange server cve cisa-kev unknown","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13"},{"id":"CVE:CVE-2023-36424","cve":"CVE-2023-36424","title":"Microsoft Windows Out-of-Bounds Read Vulnerability","date":"2026-04-13","vendor":"Microsoft","product":"Windows","source":"CISA-KEV","cisa_url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog","source_url":"https://nvd.nist.gov/vuln/detail/CVE-2023-36424","severity":"high","ransomware":"Unknown","cvss":null,"exploited":true,"published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":null,"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"candidates":[{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-36424","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"nvd","confidence":0.8}],"date_basis":"nvd","link_checked_at":null,"sourceUrl":"https://nvd.nist.gov/vuln/detail/CVE-2023-36424","added":"2026-04-13T00:00:00.000Z","public_url":"https://nvd.nist.gov/vuln/detail/CVE-2023-36424","public_source":"CVE","public_source_slug":"cve","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve:cve-2023-36424 cve-2023-36424 microsoft windows out-of-bounds read vulnerability microsoft windows cve cisa-kev unknown","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13"},{"id":"CVE:CVE-2025-60710","cve":"CVE-2025-60710","title":"Microsoft Windows Link Following Vulnerability","date":"2026-04-13","vendor":"Microsoft","product":"Windows","source":"CISA-KEV","cisa_url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog","source_url":"https://nvd.nist.gov/vuln/detail/CVE-2025-60710","severity":"high","ransomware":"Unknown","cvss":null,"exploited":true,"published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":null,"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"candidates":[{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-60710","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"nvd","confidence":0.8}],"date_basis":"nvd","link_checked_at":null,"sourceUrl":"https://nvd.nist.gov/vuln/detail/CVE-2025-60710","added":"2026-04-13T00:00:00.000Z","public_url":"https://nvd.nist.gov/vuln/detail/CVE-2025-60710","public_source":"CVE","public_source_slug":"cve","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve:cve-2025-60710 cve-2025-60710 microsoft windows link following vulnerability microsoft windows cve cisa-kev unknown","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13"},{"id":"CVE:CVE-2026-21643","cve":"CVE-2026-21643","title":"Fortinet SQL Injection Vulnerability","date":"2026-04-13","vendor":"Fortinet","product":"FortiClient EMS","source":"CISA-KEV","cisa_url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog","source_url":"https://nvd.nist.gov/vuln/detail/CVE-2026-21643","severity":"high","ransomware":"Unknown","cvss":null,"exploited":true,"published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":null,"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"candidates":[{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-21643","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"nvd","confidence":0.8}],"date_basis":"nvd","link_checked_at":null,"sourceUrl":"https://nvd.nist.gov/vuln/detail/CVE-2026-21643","added":"2026-04-13T00:00:00.000Z","public_url":"https://nvd.nist.gov/vuln/detail/CVE-2026-21643","public_source":"CVE","public_source_slug":"cve","vendor_slug":"fortinet","severity_norm":"high","search_text":"cve:cve-2026-21643 cve-2026-21643 fortinet sql injection vulnerability fortinet forticlient ems cve cisa-kev unknown","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13"},{"id":"CVE:CVE-2026-34621","cve":"CVE-2026-34621","title":"Adobe Acrobat and Reader Prototype Pollution Vulnerability","date":"2026-04-13","vendor":"Adobe","product":"Acrobat and Reader","source":"CISA-KEV","cisa_url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog","source_url":"https://nvd.nist.gov/vuln/detail/CVE-2026-34621","severity":"high","ransomware":"Unknown","cvss":null,"exploited":true,"published":"2026-04-13","updated":null,"source_published":"2026-04-13","source_updated":null,"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"candidates":[{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-34621","published":"2026-04-13","updated":"2026-04-13","checked_at":null,"status_ok":null,"source_kind":"nvd","confidence":0.8}],"date_basis":"nvd","link_checked_at":null,"sourceUrl":"https://nvd.nist.gov/vuln/detail/CVE-2026-34621","added":"2026-04-13T00:00:00.000Z","public_url":"https://nvd.nist.gov/vuln/detail/CVE-2026-34621","public_source":"CVE","public_source_slug":"cve","vendor_slug":"adobe","severity_norm":"high","search_text":"cve:cve-2026-34621 cve-2026-34621 adobe acrobat and reader prototype pollution vulnerability adobe acrobat and reader cve cisa-kev unknown","public_published":"2026-04-13","public_updated":null,"public_display_date":"2026-04-13","public_sort_date":"2026-04-13","public_period_date":"2026-04-13"},{"id":"BSI:WID-SEC-W-2026-0472","cve":"CVE-2026-22168","title":"OpenClaw: Mehrere Schwachstellen","date":"2026-02-22","published":"2026-02-22","updated":"2026-04-12","source_published":"2026-02-22","source_updated":"2026-04-12","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://github.com/openclaw/openclaw/security/advisories","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0472.json","summary":"WID-SEC-W-2026-0472 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0472","summary":"WID-SEC-2026-0472 - Portal Version","category":"self"},{"url":"https://github.com/openclaw/openclaw/security/advisories","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-25gx-x37c-7pph","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-2fgq-7j6h-9rm4","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-2hm8-rqrm-xfjq","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-2mc2-g238-722j","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-2prf-9cw7-fq62","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-2rgf-hm63-5qph","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-3cvx-236h-m9fj","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-3x3x-h76w-hp98","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-3xfw-4pmr-4xc5","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-43x4-g22p-3hrq","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-45cg-2683-gfmq","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-4cqv-h74h-93j4","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-4gc7-qcvf-38wg","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-4rqq-w8v4-7p47","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-56pc-6hvp-4gv4","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-5847-rm3g-23mw","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-5ghc-98wh-gwwf","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-5h2c-8v84-qpvr","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-5mx2-2mgw-x8rm","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-5v6x-rfc3-7qfr","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-62f6-mrcj-v8h5","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-65rx-fvh6-r4h2","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-6j27-pc5c-m8w8","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-74xj-763f-264w","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-7fcc-cw49-xm78","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-82g8-464f-2mv7","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-8cp7-rp8r-mg77","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-8fmp-37rc-p5g7","summary":"OpenClaw Security A)dvisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-9p38-94jf-hgjj","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-cjv3-m589-v3rx","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-f6h3-846h-2r8w","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-f8mp-vj46-cq8v","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-fg3m-vhrr-8gj6","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-gq83-8q7q-9hfx","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-hff7-ccv5-52f8","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-jj82-76v6-933r","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-jjgj-cpp9-cvpv","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-jq4x-98m3-ggq6","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-jwf4-8wf4-jf2m","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-mfg5-7q5g-f37j","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-mqr9-vqhq-3jxw","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-rx3g-mvc3-qfjf","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-rxxp-482v-7mrh","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-v3j7-34xh-6g3w","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-v6x2-2qvm-6gv8","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-vffc-f7r7-rx2w","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-vmqr-rc7x-3446","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-vvjh-f6p9-5vcf","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-w7j5-j98m-w679","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-w9cg-v44m-4qv8","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-wpph-cjgr-7c39","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-x2g4-7mj7-2hhj","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-x9cf-3w63-rpq9","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-xgf2-vxv2-rrmg","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-xwcr-v472-8hhr","summary":"OpenClaw Security Advisories vom 2026-02-22","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://github.com/openclaw/openclaw/security/advisories","published":"2026-02-22","updated":"2026-04-12","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-13T09:01:31.367Z","sourceUrl":"https://github.com/openclaw/openclaw/security/advisories","added":"2026-04-12T00:00:00.000Z","public_url":"https://github.com/openclaw/openclaw/security/advisories","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-w-2026-0472 cve-2026-22168 openclaw: mehrere schwachstellen bsi bsi","public_published":"2026-02-22","public_updated":"2026-04-12","public_display_date":"2026-04-12","public_sort_date":"2026-04-12","public_period_date":"2026-04-12"},{"id":"BSI:WID-SEC-W-2026-0720","cve":"CVE-2026-4105","title":"systemd: Mehrere Schwachstellen","date":"2026-03-12","published":"2026-03-12","updated":"2026-04-12","source_published":"2026-03-12","source_updated":"2026-04-12","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://github.com/systemd/systemd/security/advisories/GHSA-4h6x-r8vx-3862","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0720.json","summary":"WID-SEC-W-2026-0720 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0720","summary":"WID-SEC-2026-0720 - Portal Version","category":"self"},{"url":"https://github.com/systemd/systemd/security/advisories/GHSA-4h6x-r8vx-3862","summary":"GitHub Security Advisory GHSA-4h6x-r8vx-3862 vom 2026-03-12","category":"external"},{"url":"https://github.com/systemd/systemd/security/advisories/GHSA-9mj4-rrc3-gjcx","summary":"GitHub Security Advisory GHSA-9mj4-rrc3-gjcx vom 2026-03-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024838.html","summary":"SUSE Security Update SUSE-SU-2026:0991-1 vom 2026-03-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024839.html","summary":"SUSE Security Update SUSE-SU-2026:0990-1 vom 2026-03-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024899.html","summary":"SUSE Security Update SUSE-SU-2026:20822-1 vom 2026-03-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024898.html","summary":"SUSE Security Update SUSE-SU-2026:20823-1 vom 2026-03-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024932.html","summary":"SUSE Security Update SUSE-SU-2026:1040-1 vom 2026-03-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024937.html","summary":"SUSE Security Update SUSE-SU-2026:20826-1 vom 2026-03-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024936.html","summary":"SUSE Security Update SUSE-SU-2026:20827-1 vom 2026-03-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024948.html","summary":"SUSE Security Update SUSE-SU-2026:1061-1 vom 2026-03-26","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://github.com/systemd/systemd/security/advisories/GHSA-4h6x-r8vx-3862","published":"2026-03-12","updated":"2026-04-12","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-13T09:01:31.367Z","sourceUrl":"https://github.com/systemd/systemd/security/advisories/GHSA-4h6x-r8vx-3862","added":"2026-04-12T00:00:00.000Z","public_url":"https://github.com/systemd/systemd/security/advisories/GHSA-4h6x-r8vx-3862","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-w-2026-0720 cve-2026-4105 systemd: mehrere schwachstellen bsi bsi","public_published":"2026-03-12","public_updated":"2026-04-12","public_display_date":"2026-04-12","public_sort_date":"2026-04-12","public_period_date":"2026-04-12"},{"id":"BSI:WID-SEC-W-2026-0831","cve":"CVE-2026-29111","title":"systemd: Mehrere Schwachstellen","date":"2026-03-23","published":"2026-03-23","updated":"2026-04-12","source_published":"2026-03-23","source_updated":"2026-04-12","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://github.com/systemd/systemd/security/advisories/GHSA-848h-497j-8vjq","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0831.json","summary":"WID-SEC-W-2026-0831 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0831","summary":"WID-SEC-2026-0831 - Portal Version","category":"self"},{"url":"https://github.com/systemd/systemd/security/advisories/GHSA-848h-497j-8vjq","summary":"Systemd GitHub Advisory vom 2026-03-23","category":"external"},{"url":"https://github.com/systemd/systemd/security/advisories/GHSA-gx6q-6f99-m764","summary":"Systemd GitHub Advisory vom 2026-03-23","category":"external"},{"url":"https://github.com/systemd/systemd/security/advisories/GHSA-vpfq-8p5f-jcqx","summary":"Systemd GitHub Advisory vom 2026-03-23","category":"external"},{"url":"https://github.com/systemd/systemd/security/advisories/GHSA-x4h8-rrrg-q78f","summary":"Systemd GitHub Advisory vom 2026-03-23","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024839.html","summary":"SUSE Security Update SUSE-SU-2026:0990-1 vom 2026-03-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024898.html","summary":"SUSE Security Update SUSE-SU-2026:20823-1 vom 2026-03-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024899.html","summary":"SUSE Security Update SUSE-SU-2026:20822-1 vom 2026-03-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024932.html","summary":"SUSE Security Update SUSE-SU-2026:1040-1 vom 2026-03-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024937.html","summary":"SUSE Security Update SUSE-SU-2026:20826-1 vom 2026-03-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024948.html","summary":"SUSE Security Update SUSE-SU-2026:1061-1 vom 2026-03-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024936.html","summary":"SUSE Security Update SUSE-SU-2026:20827-1 vom 2026-03-26","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://github.com/systemd/systemd/security/advisories/GHSA-848h-497j-8vjq","published":"2026-03-23","updated":"2026-04-12","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-13T09:01:31.367Z","sourceUrl":"https://github.com/systemd/systemd/security/advisories/GHSA-848h-497j-8vjq","added":"2026-04-12T00:00:00.000Z","public_url":"https://github.com/systemd/systemd/security/advisories/GHSA-848h-497j-8vjq","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-w-2026-0831 cve-2026-29111 systemd: mehrere schwachstellen bsi bsi","public_published":"2026-03-23","public_updated":"2026-04-12","public_display_date":"2026-04-12","public_sort_date":"2026-04-12","public_period_date":"2026-04-12"},{"id":"BSI:WID-SEC-W-2026-0856","cve":"CVE-2026-34510","title":"OpenClaw: Mehrere Schwachstellen","date":"2026-03-24","published":"2026-03-24","updated":"2026-04-12","source_published":"2026-03-24","source_updated":"2026-04-12","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-39pp-xp36-q6mg","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0856.json","summary":"WID-SEC-W-2026-0856 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0856","summary":"WID-SEC-2026-0856 - Portal Version","category":"self"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-39pp-xp36-q6mg","summary":"OpenClaw GitHub vom 2026-03-24","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-3w6x-gv34-mqpf","summary":"OpenClaw GitHub vom 2026-03-24","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-48vw-m3qc-wr99","summary":"OpenClaw GitHub vom 2026-03-24","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-4qwc-c7g9-4xcw","summary":"OpenClaw GitHub vom 2026-03-24","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-65h8-27jh-q8wv","summary":"OpenClaw GitHub vom 2026-03-24","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-6mqc-jqh6-x8fc","summary":"OpenClaw GitHub vom 2026-03-24","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-74wf-h43j-vvmj","summary":"OpenClaw GitHub vom 2026-03-24","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-844j-xrrq-wgh4","summary":"OpenClaw GitHub vom 2026-03-24","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-8883-9w57-vwv6","summary":"OpenClaw GitHub vom 2026-03-24","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-cfp9-w5v9-3q4h","summary":"OpenClaw GitHub vom 2026-03-24","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-cg6c-q2hx-69h7","summary":"OpenClaw GitHub vom 2026-03-24","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-cxmw-p77q-wchg","summary":"OpenClaw GitHub vom 2026-03-24","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-h3x4-hc5v-v2gm","summary":"OpenClaw GitHub vom 2026-03-24","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-hf68-49fm-59cq","summary":"OpenClaw GitHub vom 2026-03-24","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-mp66-rf4f-mhh8","summary":"OpenClaw GitHub vom 2026-03-24","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-ppwq-6v66-5m6j","summary":"OpenClaw GitHub vom 2026-03-24","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-pw7h-9g6p-c378","summary":"OpenClaw GitHub vom 2026-03-24","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-qm9x-v7cx-7rq4","summary":"OpenClaw GitHub vom 2026-03-24","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-rm59-992w-x2mv","summary":"OpenClaw GitHub vom 2026-03-24","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-rqp8-q22p-5j9q","summary":"OpenClaw GitHub vom 2026-03-24","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-rvqr-hrcc-j9vv","summary":"OpenClaw GitHub vom 2026-03-24","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-vfg3-pqpq-93m4","summary":"OpenClaw GitHub vom 2026-03-24","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-wj55-88gf-x564","summary":"OpenClaw GitHub vom 2026-03-24","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-wq58-2pvg-5h4f","summary":"OpenClaw GitHub vom 2026-03-24","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-wv46-v6xc-2qhf","summary":"OpenClaw GitHub vom 2026-03-24","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-xhq5-45pm-2gjr","summary":"OpenClaw GitHub vom 2026-03-24","category":"external"}],"severity":"high","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-39pp-xp36-q6mg","published":"2026-03-24","updated":"2026-04-12","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-13T09:01:31.367Z","sourceUrl":"https://github.com/openclaw/openclaw/security/advisories/GHSA-39pp-xp36-q6mg","added":"2026-04-12T00:00:00.000Z","public_url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-39pp-xp36-q6mg","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-w-2026-0856 cve-2026-34510 openclaw: mehrere schwachstellen bsi bsi","public_published":"2026-03-24","public_updated":"2026-04-12","public_display_date":"2026-04-12","public_sort_date":"2026-04-12","public_period_date":"2026-04-12"},{"id":"BSI:WID-SEC-W-2026-0884","cve":"CVE-2026-34512","title":"OpenClaw: Mehrere Schwachstellen","date":"2026-03-26","published":"2026-03-26","updated":"2026-04-12","source_published":"2026-03-26","source_updated":"2026-04-12","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://github.com/advisories/GHSA-x2cm-hg9c-mf5w","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0884.json","summary":"WID-SEC-W-2026-0884 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0884","summary":"WID-SEC-2026-0884 - Portal Version","category":"self"},{"url":"https://github.com/advisories/GHSA-x2cm-hg9c-mf5w","summary":"Openclaw Github vom 2026-03-26","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-3h52-cx59-c456","summary":"Openclaw Github vom 2026-03-26","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-4hmj-39m8-jwc7","summary":"Openclaw Github vom 2026-03-26","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-52q4-3xjc-6778","summary":"Openclaw Github vom 2026-03-26","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-5jvj-hxmh-6h6j","summary":"Openclaw Github vom 2026-03-26","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-77w2-crqv-cmv3","summary":"Openclaw Github vom 2026-03-26","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-9p93-7j67-5pc2","summary":"Openclaw Github vom 2026-03-26","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-fqw4-mph7-2vr8","summary":"Openclaw Github vom 2026-03-26","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-h4jx-hjr3-fhgc","summary":"Openclaw Github vom 2026-03-26","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-j4c9-w69r-cw33","summary":"Openclaw Github vom 2026-03-26","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-mw7w-g3mg-xqm7","summary":"Openclaw Github vom 2026-03-26","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-vcx4-4qxg-mfp4","summary":"Openclaw Github vom 2026-03-26","category":"external"}],"severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":["last_affected"],"candidates":[{"url":"https://github.com/advisories/GHSA-x2cm-hg9c-mf5w","published":"2026-03-26","updated":"2026-04-12","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-13T09:01:31.367Z","sourceUrl":"https://github.com/advisories/GHSA-x2cm-hg9c-mf5w","added":"2026-04-12T00:00:00.000Z","public_url":"https://github.com/advisories/GHSA-x2cm-hg9c-mf5w","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-w-2026-0884 cve-2026-34512 openclaw: mehrere schwachstellen bsi bsi","public_published":"2026-03-26","public_updated":"2026-04-12","public_display_date":"2026-04-12","public_sort_date":"2026-04-12","public_period_date":"2026-04-12"},{"id":"BSI:WID-SEC-W-2026-1063","cve":"CVE-2026-31413","title":"Linux Kernel: Schwachstelle ermöglicht Denial of Service","date":"2026-04-12","published":"2026-04-12","updated":null,"source_published":"2026-04-12","source_updated":"2026-04-12","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://kernel.org","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1063.json","summary":"WID-SEC-W-2026-1063 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1063","summary":"WID-SEC-2026-1063 - Portal Version","category":"self"},{"url":"https://kernel.org","summary":"Linux Kernel CVE Announcements vom 2026-04-12","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026041220-CVE-2026-31413-cce6@gregkh/","summary":"Linux Kernel CVE Announcement vom 2026-04-12","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://kernel.org","published":"2026-04-12","updated":"2026-04-12","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-14T06:35:46.698Z","sourceUrl":"https://kernel.org","added":"2026-04-12T00:00:00.000Z","public_url":"https://kernel.org","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-w-2026-1063 cve-2026-31413 linux kernel: schwachstelle ermöglicht denial of service bsi bsi","public_published":"2026-04-12","public_updated":null,"public_display_date":"2026-04-12","public_sort_date":"2026-04-12","public_period_date":"2026-04-12"},{"id":"BSI:WID-SEC-W-2026-1064","cve":"CVE-2026-1502","title":"CPython: Mehrere Schwachstellen","date":"2026-04-12","published":"2026-04-12","updated":null,"source_published":"2026-04-12","source_updated":"2026-04-12","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://mail.python.org/archives/list/security-announce@python.org/thread/2IVPAEQWUJBCTQZEJEVTYCIKSMQPGRZ3/","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1064.json","summary":"WID-SEC-W-2026-1064 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1064","summary":"WID-SEC-2026-1064 - Portal Version","category":"self"},{"url":"https://mail.python.org/archives/list/security-announce@python.org/thread/2IVPAEQWUJBCTQZEJEVTYCIKSMQPGRZ3/","summary":"Python Advisory vom 2026-04-12","category":"external"},{"url":"https://seclists.org/oss-sec/2026/q2/98","summary":"OSS Security Mailing List vom 2026-04-12","category":"external"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-1502","summary":"CVERecord vom 2026-04-12","category":"external"},{"url":"https://mail.python.org/archives/list/security-announce@python.org/thread/F5ZT5ICGJ6CKXVUJ34YBVY7WOZ5SHG53/","summary":"Python Advisory vom 2026-04-12","category":"external"},{"url":"https://seclists.org/oss-sec/2026/q2/99","summary":"OSS Security Mailing List vom 2026-04-12","category":"external"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-3446","summary":"CVERecord vom 2026-04-12","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://mail.python.org/archives/list/security-announce@python.org/thread/2IVPAEQWUJBCTQZEJEVTYCIKSMQPGRZ3/","published":"2026-04-12","updated":"2026-04-12","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-14T06:35:46.698Z","sourceUrl":"https://mail.python.org/archives/list/security-announce@python.org/thread/2IVPAEQWUJBCTQZEJEVTYCIKSMQPGRZ3/","added":"2026-04-12T00:00:00.000Z","public_url":"https://mail.python.org/archives/list/security-announce@python.org/thread/2IVPAEQWUJBCTQZEJEVTYCIKSMQPGRZ3/","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-w-2026-1064 cve-2026-1502 cpython: mehrere schwachstellen bsi bsi","public_published":"2026-04-12","public_updated":null,"public_display_date":"2026-04-12","public_sort_date":"2026-04-12","public_period_date":"2026-04-12"},{"id":"BSI:WID-SEC-W-2026-1065","cve":"CVE-2026-27486","title":"OpenClaw: Mehrere Schwachstellen","date":"2026-04-12","published":"2026-04-12","updated":null,"source_published":"2026-04-12","source_updated":"2026-04-12","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://euvd.enisa.europa.eu/enisa/EUVD-2026-21430","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1065.json","summary":"WID-SEC-W-2026-1065 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1065","summary":"WID-SEC-2026-1065 - Portal Version","category":"self"},{"url":"https://euvd.enisa.europa.eu/enisa/EUVD-2026-21430","summary":"EU Vulnerability Database vom 2026-04-12","category":"external"},{"url":"https://euvd.enisa.europa.eu/enisa/EUVD-2026-21432","summary":"EU Vulnerability Database vom 2026-04-12","category":"external"},{"url":"https://euvd.enisa.europa.eu/enisa/EUVD-2026-21434","summary":"EU Vulnerability Database vom 2026-04-12","category":"external"},{"url":"https://euvd.enisa.europa.eu/enisa/EUVD-2026-21436","summary":"EU Vulnerability Database vom 2026-04-12","category":"external"},{"url":"https://euvd.enisa.europa.eu/enisa/EUVD-2026-21440","summary":"EU Vulnerability Database vom 2026-04-12","category":"external"},{"url":"https://euvd.enisa.europa.eu/enisa/EUVD-2026-21452","summary":"EU Vulnerability Database vom 2026-04-12","category":"external"},{"url":"https://euvd.enisa.europa.eu/enisa/EUVD-2026-21454","summary":"EU Vulnerability Database vom 2026-04-12","category":"external"},{"url":"https://euvd.enisa.europa.eu/enisa/EUVD-2026-21472","summary":"EU Vulnerability Database vom 2026-04-12","category":"external"},{"url":"https://euvd.enisa.europa.eu/enisa/EUVD-2026-21476","summary":"EU Vulnerability Database vom 2026-04-12","category":"external"},{"url":"https://euvd.enisa.europa.eu/enisa/EUVD-2026-21480","summary":"EU Vulnerability Database vom 2026-04-12","category":"external"},{"url":"https://euvd.enisa.europa.eu/enisa/EUVD-2026-21482","summary":"EU Vulnerability Database vom 2026-04-12","category":"external"},{"url":"https://euvd.enisa.europa.eu/enisa/EUVD-2026-21484","summary":"EU Vulnerability Database vom 2026-04-12","category":"external"}],"severity":"high","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://euvd.enisa.europa.eu/enisa/EUVD-2026-21430","published":"2026-04-12","updated":"2026-04-12","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-14T06:35:46.698Z","sourceUrl":"https://euvd.enisa.europa.eu/enisa/EUVD-2026-21430","added":"2026-04-12T00:00:00.000Z","public_url":"https://euvd.enisa.europa.eu/enisa/EUVD-2026-21430","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-w-2026-1065 cve-2026-27486 openclaw: mehrere schwachstellen bsi bsi","public_published":"2026-04-12","public_updated":null,"public_display_date":"2026-04-12","public_sort_date":"2026-04-12","public_period_date":"2026-04-12"},{"id":"BSI:WID-SEC-W-2026-1066","cve":"CVE-2026-40227","title":"systemd: Mehrere Schwachstellen","date":"2026-04-12","published":"2026-04-12","updated":null,"source_published":"2026-04-12","source_updated":"2026-04-12","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://github.com/advisories/GHSA-X53V-PXF5-CHX6","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1066.json","summary":"WID-SEC-W-2026-1066 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1066","summary":"WID-SEC-2026-1066 - Portal Version","category":"self"},{"url":"https://github.com/advisories/GHSA-X53V-PXF5-CHX6","summary":"GitHub Advisory Database vom 2026-04-12","category":"external"},{"url":"https://github.com/advisories/GHSA-grjh-583f-v73h","summary":"GitHub Security Advisory vom 2026-04-12","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://github.com/advisories/GHSA-X53V-PXF5-CHX6","published":"2026-04-12","updated":"2026-04-12","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-14T09:00:56.117Z","sourceUrl":"https://github.com/advisories/GHSA-X53V-PXF5-CHX6","added":"2026-04-12T00:00:00.000Z","public_url":"https://github.com/advisories/GHSA-X53V-PXF5-CHX6","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-w-2026-1066 cve-2026-40227 systemd: mehrere schwachstellen bsi bsi","public_published":"2026-04-12","public_updated":null,"public_display_date":"2026-04-12","public_sort_date":"2026-04-12","public_period_date":"2026-04-12"},{"id":"BSI:WID-SEC-W-2026-1067","cve":"CVE-2026-34477","title":"Apache log4j: Mehrere Schwachstellen ermöglichen Manipulation von Dateien","date":"2026-04-12","published":"2026-04-12","updated":null,"source_published":"2026-04-12","source_updated":"2026-04-12","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://github.com/advisories/GHSA-6HG6-V5C8-FPHQ","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1067.json","summary":"WID-SEC-W-2026-1067 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1067","summary":"WID-SEC-2026-1067 - Portal Version","category":"self"},{"url":"https://github.com/advisories/GHSA-6HG6-V5C8-FPHQ","summary":"GitHub Security Advisory GHSA-6HG6-V5C8-FPHQ vom 2026-04-12","category":"external"},{"url":"https://github.com/advisories/GHSA-445C-VH5M-36RJ","summary":"GitHub Security Advisory GHSA-445C-VH5M-36RJ vom 2026-04-12","category":"external"},{"url":"https://github.com/advisories/GHSA-H383-GMXW-35V2","summary":"GitHub Security Advisory GHSA-H383-GMXW-35V2 vom 2026-04-12","category":"external"},{"url":"https://github.com/advisories/GHSA-3pxv-7cmr-fjr4","summary":"GitHub Security Advisory GHSA-3pxv-7cmr-fjr4 vom 2026-04-12","category":"external"},{"url":"https://github.com/advisories/GHSA-w35j-pv5h-q9q9","summary":"GitHub Security Advisory GHSA-w35j-pv5h-q9q9 vom 2026-04-12","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://github.com/advisories/GHSA-6HG6-V5C8-FPHQ","published":"2026-04-12","updated":"2026-04-12","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-14T09:00:56.117Z","sourceUrl":"https://github.com/advisories/GHSA-6HG6-V5C8-FPHQ","added":"2026-04-12T00:00:00.000Z","public_url":"https://github.com/advisories/GHSA-6HG6-V5C8-FPHQ","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-w-2026-1067 cve-2026-34477 apache log4j: mehrere schwachstellen ermöglichen manipulation von dateien bsi bsi","public_published":"2026-04-12","public_updated":null,"public_display_date":"2026-04-12","public_sort_date":"2026-04-12","public_period_date":"2026-04-12"},{"id":"BSI:WID-SEC-2025-2187","cve":"","title":"Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-04-10","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2187","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-10T09:01:20.963Z","published":"2026-04-10","source_published":"2026-04-10","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2187","published":"2026-04-10","updated":"2026-04-10","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2187","added":"2026-04-10T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2187","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-10","public_updated":null,"public_display_date":"2026-04-10","public_sort_date":"2026-04-10","public_period_date":"2026-04-10","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2187 linux kernel: mehrere schwachstellen ermöglichen denial of service bsi bsi"},{"id":"BSI:WID-SEC-2025-2212","cve":"","title":"OpenSSH: Mehrere Schwachstellen ermöglichen Codeausführung","date":"2026-04-10","published":"2026-04-10","updated":null,"source_published":"2026-04-10","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2212","severity":"low","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2212","published":"2026-04-10","updated":"2026-04-10","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-10T09:01:20.963Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2212","added":"2026-04-10T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2212","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-10","public_updated":null,"public_display_date":"2026-04-10","public_sort_date":"2026-04-10","public_period_date":"2026-04-10","severity_norm":"low","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2212 openssh: mehrere schwachstellen ermöglichen codeausführung bsi bsi"},{"id":"BSI:WID-SEC-2025-2229","cve":"","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-04-10","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2229","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-10T09:01:20.963Z","published":"2026-04-10","source_published":"2026-04-10","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2229","published":"2026-04-10","updated":"2026-04-10","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2229","added":"2026-04-10T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2229","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-10","public_updated":null,"public_display_date":"2026-04-10","public_sort_date":"2026-04-10","public_period_date":"2026-04-10","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2229 linux kernel: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2025-2249","cve":"","title":"Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-04-10","published":"2026-04-10","updated":null,"source_published":"2026-04-10","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2249","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2249","published":"2026-04-10","updated":"2026-04-10","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-10T09:01:20.963Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2249","added":"2026-04-10T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2249","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-10","public_updated":null,"public_display_date":"2026-04-10","public_sort_date":"2026-04-10","public_period_date":"2026-04-10","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2249 linux kernel: mehrere schwachstellen ermöglichen denial of service bsi bsi"},{"id":"BSI:WID-SEC-2025-2268","cve":"","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-04-10","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2268","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-10T09:01:20.963Z","published":"2026-04-10","source_published":"2026-04-10","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2268","published":"2026-04-10","updated":"2026-04-10","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2268","added":"2026-04-10T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2268","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-10","public_updated":null,"public_display_date":"2026-04-10","public_sort_date":"2026-04-10","public_period_date":"2026-04-10","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2268 linux kernel: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2025-2329","cve":"","title":"cPanel/WHM (PostgreSQL, Perl): Mehrere Schwachstellen","date":"2026-04-10","published":"2026-04-10","updated":null,"source_published":"2026-04-10","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2329","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2329","published":"2026-04-10","updated":"2026-04-10","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-10T09:01:20.963Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2329","added":"2026-04-10T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2329","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2025-2329 cpanel/whm (postgresql, perl): mehrere schwachstellen bsi bsi","public_published":"2026-04-10","public_updated":null,"public_display_date":"2026-04-10","public_sort_date":"2026-04-10","public_period_date":"2026-04-10"},{"id":"BSI:WID-SEC-2025-2365","cve":"","title":"Oracle Java SE: Mehrere Schwachstellen","date":"2026-04-10","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2365","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-10T09:01:20.963Z","published":"2026-04-10","source_published":"2026-04-10","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2365","published":"2026-04-10","updated":"2026-04-10","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2365","added":"2026-04-10T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2365","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-10","public_updated":null,"public_display_date":"2026-04-10","public_sort_date":"2026-04-10","public_period_date":"2026-04-10","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2365 oracle java se: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2025-2420","cve":"","title":"Apache Tomcat: Mehrere Schwachstellen","date":"2026-04-10","published":"2026-04-10","updated":null,"source_published":"2026-04-10","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2420","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2420","published":"2026-04-10","updated":"2026-04-10","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-13T06:01:30.852Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2420","added":"2026-04-10T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2420","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-10","public_updated":null,"public_display_date":"2026-04-10","public_sort_date":"2026-04-10","public_period_date":"2026-04-10","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2420 apache tomcat: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2025-2483","cve":"","title":"Linux Kernel: Schwachstelle ermöglicht Denial of Service","date":"2026-04-10","published":"2026-04-10","updated":null,"source_published":"2026-04-10","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2483","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2483","published":"2026-04-10","updated":"2026-04-10","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-13T06:01:30.852Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2483","added":"2026-04-10T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2483","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-10","public_updated":null,"public_display_date":"2026-04-10","public_sort_date":"2026-04-10","public_period_date":"2026-04-10","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2483 linux kernel: schwachstelle ermöglicht denial of service bsi bsi"},{"id":"BSI:WID-SEC-2025-2568","cve":"","title":"Red Hat Enterprise Linux (kea): Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-04-10","published":"2026-04-10","updated":null,"source_published":"2026-04-10","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2568","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2568","published":"2026-04-10","updated":"2026-04-10","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-13T09:01:31.367Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2568","added":"2026-04-10T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2568","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2025-2568 red hat enterprise linux (kea): mehrere schwachstellen ermöglichen denial of service bsi bsi","public_published":"2026-04-10","public_updated":null,"public_display_date":"2026-04-10","public_sort_date":"2026-04-10","public_period_date":"2026-04-10"},{"id":"BSI:WID-SEC-2025-2637","cve":"","title":"Rsync: Schwachstelle ermöglicht nicht spezifizierten Angriff","date":"2026-04-10","published":"2026-04-10","updated":null,"source_published":"2026-04-10","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2637","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2637","published":"2026-04-10","updated":"2026-04-10","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-13T09:01:31.367Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2637","added":"2026-04-10T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2637","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-10","public_updated":null,"public_display_date":"2026-04-10","public_sort_date":"2026-04-10","public_period_date":"2026-04-10","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2637 rsync: schwachstelle ermöglicht nicht spezifizierten angriff bsi bsi"},{"id":"BSI:WID-SEC-2025-2651","cve":"","title":"GnuTLS: Schwachstelle ermöglicht nicht spezifizierten Angriff","date":"2026-04-10","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2651","severity":"low","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-13T09:01:31.367Z","published":"2026-04-10","source_published":"2026-04-10","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2651","published":"2026-04-10","updated":"2026-04-10","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2651","added":"2026-04-10T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2651","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-10","public_updated":null,"public_display_date":"2026-04-10","public_sort_date":"2026-04-10","public_period_date":"2026-04-10","severity_norm":"low","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2651 gnutls: schwachstelle ermöglicht nicht spezifizierten angriff bsi bsi"},{"id":"BSI:WID-SEC-2025-2765","cve":"","title":"Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-04-10","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2765","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-13T09:01:31.367Z","published":"2026-04-10","source_published":"2026-04-10","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2765","published":"2026-04-10","updated":"2026-04-10","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2765","added":"2026-04-10T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2765","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-10","public_updated":null,"public_display_date":"2026-04-10","public_sort_date":"2026-04-10","public_period_date":"2026-04-10","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2765 linux kernel: mehrere schwachstellen ermöglichen denial of service bsi bsi"},{"id":"BSI:WID-SEC-2025-2868","cve":"","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-04-10","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2868","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-13T09:01:31.367Z","published":"2026-04-10","source_published":"2026-04-10","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2868","published":"2026-04-10","updated":"2026-04-10","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2868","added":"2026-04-10T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2868","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-10","public_updated":null,"public_display_date":"2026-04-10","public_sort_date":"2026-04-10","public_period_date":"2026-04-10","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2868 linux kernel: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2025-2904","cve":"","title":"Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-04-10","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2904","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-13T09:01:31.367Z","published":"2026-04-10","source_published":"2026-04-10","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2904","published":"2026-04-10","updated":"2026-04-10","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2904","added":"2026-04-10T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2904","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-10","public_updated":null,"public_display_date":"2026-04-10","public_sort_date":"2026-04-10","public_period_date":"2026-04-10","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2904 linux kernel: mehrere schwachstellen ermöglichen denial of service bsi bsi"},{"id":"BSI:WID-SEC-2025-2914","cve":"","title":"Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-04-10","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2914","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-13T09:01:31.367Z","published":"2026-04-10","source_published":"2026-04-10","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2914","published":"2026-04-10","updated":"2026-04-10","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2914","added":"2026-04-10T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2914","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-10","public_updated":null,"public_display_date":"2026-04-10","public_sort_date":"2026-04-10","public_period_date":"2026-04-10","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2914 linux kernel: mehrere schwachstellen ermöglichen denial of service bsi bsi"},{"id":"BSI:WID-SEC-2025-2915","cve":"","title":"Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-04-10","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2915","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-13T09:01:31.367Z","published":"2026-04-10","source_published":"2026-04-10","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2915","published":"2026-04-10","updated":"2026-04-10","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2915","added":"2026-04-10T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2915","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-10","public_updated":null,"public_display_date":"2026-04-10","public_sort_date":"2026-04-10","public_period_date":"2026-04-10","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2915 linux kernel: mehrere schwachstellen ermöglichen denial of service bsi bsi"},{"id":"BSI:WID-SEC-2025-2920","cve":"","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-04-10","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2920","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-13T09:01:31.367Z","published":"2026-04-10","source_published":"2026-04-10","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2920","published":"2026-04-10","updated":"2026-04-10","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2920","added":"2026-04-10T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2920","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-10","public_updated":null,"public_display_date":"2026-04-10","public_sort_date":"2026-04-10","public_period_date":"2026-04-10","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2920 linux kernel: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2025-2929","cve":"","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-04-10","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2929","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-13T09:01:31.367Z","published":"2026-04-10","source_published":"2026-04-10","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2929","published":"2026-04-10","updated":"2026-04-10","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2929","added":"2026-04-10T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2929","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-10","public_updated":null,"public_display_date":"2026-04-10","public_sort_date":"2026-04-10","public_period_date":"2026-04-10","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2929 linux kernel: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2025-2941","cve":"","title":"Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-04-10","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2941","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-13T09:01:31.367Z","published":"2026-04-10","source_published":"2026-04-10","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2941","published":"2026-04-10","updated":"2026-04-10","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2941","added":"2026-04-10T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2941","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-10","public_updated":null,"public_display_date":"2026-04-10","public_sort_date":"2026-04-10","public_period_date":"2026-04-10","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2941 linux kernel: mehrere schwachstellen ermöglichen denial of service bsi bsi"},{"id":"BSI:WID-SEC-2026-0009","cve":"","title":"Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-04-10","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0009","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-13T09:01:31.367Z","published":"2026-04-10","source_published":"2026-04-10","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0009","published":"2026-04-10","updated":"2026-04-10","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0009","added":"2026-04-10T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0009","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-10","public_updated":null,"public_display_date":"2026-04-10","public_sort_date":"2026-04-10","public_period_date":"2026-04-10","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0009 linux kernel: mehrere schwachstellen ermöglichen denial of service bsi bsi"},{"id":"BSI:WID-SEC-2026-0086","cve":"","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-04-10","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0086","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-13T09:01:31.367Z","published":"2026-04-10","source_published":"2026-04-10","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0086","published":"2026-04-10","updated":"2026-04-10","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0086","added":"2026-04-10T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0086","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-10","public_updated":null,"public_display_date":"2026-04-10","public_sort_date":"2026-04-10","public_period_date":"2026-04-10","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0086 linux kernel: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0111","cve":"","title":"FreeRDP: Mehrere Schwachstellen","date":"2026-04-10","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0111","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-13T09:01:31.367Z","published":"2026-04-10","source_published":"2026-04-10","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0111","published":"2026-04-10","updated":"2026-04-10","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0111","added":"2026-04-10T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0111","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-10","public_updated":null,"public_display_date":"2026-04-10","public_sort_date":"2026-04-10","public_period_date":"2026-04-10","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0111 freerdp: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0929","cve":"","title":"IBM Semeru Runtime: Schwachstelle ermöglicht Codeausführung","date":"2026-04-10","published":"2026-04-10","updated":null,"source_published":"2026-04-10","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0929","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0929","published":"2026-04-10","updated":"2026-04-10","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-13T09:01:31.367Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0929","added":"2026-04-10T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0929","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-10","public_updated":null,"public_display_date":"2026-04-10","public_sort_date":"2026-04-10","public_period_date":"2026-04-10","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0929 ibm semeru runtime: schwachstelle ermöglicht codeausführung bsi bsi"},{"id":"BSI:WID-SEC-2026-1038","cve":"","title":"Apache Tomcat und Tomcat Native: Mehrere Schwachstellen","date":"2026-04-10","published":"2026-04-10","updated":null,"source_published":"2026-04-10","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1038","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1038","published":"2026-04-10","updated":"2026-04-10","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-13T09:01:31.367Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1038","added":"2026-04-10T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1038","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1038 apache tomcat und tomcat native: mehrere schwachstellen bsi bsi","public_published":"2026-04-10","public_updated":null,"public_display_date":"2026-04-10","public_sort_date":"2026-04-10","public_period_date":"2026-04-10"},{"id":"BSI:WID-SEC-2026-1039","cve":"","title":"IBM DataPower Gateway: Schwachstelle ermöglicht Denial of Service","date":"2026-04-10","published":"2026-04-10","updated":null,"source_published":"2026-04-10","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1039","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1039","published":"2026-04-10","updated":"2026-04-10","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-13T09:01:31.367Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1039","added":"2026-04-10T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1039","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1039 ibm datapower gateway: schwachstelle ermöglicht denial of service bsi bsi","public_published":"2026-04-10","public_updated":null,"public_display_date":"2026-04-10","public_sort_date":"2026-04-10","public_period_date":"2026-04-10"},{"id":"BSI:WID-SEC-2026-1042","cve":"","title":"Apache Airflow: Mehrere Schwachstellen","date":"2026-04-10","published":"2026-04-10","updated":null,"source_published":"2026-04-10","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1042","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1042","published":"2026-04-10","updated":"2026-04-10","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-13T09:01:31.367Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1042","added":"2026-04-10T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1042","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1042 apache airflow: mehrere schwachstellen bsi bsi","public_published":"2026-04-10","public_updated":null,"public_display_date":"2026-04-10","public_sort_date":"2026-04-10","public_period_date":"2026-04-10"},{"id":"BSI:WID-SEC-2026-1043","cve":"","title":"MediaWiki Erweiterungen: Mehrere Schwachstellen ermöglichen Cross-Site Scripting","date":"2026-04-10","published":"2026-04-10","updated":null,"source_published":"2026-04-10","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1043","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1043","published":"2026-04-10","updated":"2026-04-10","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-13T09:01:31.367Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1043","added":"2026-04-10T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1043","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1043 mediawiki erweiterungen: mehrere schwachstellen ermöglichen cross-site scripting bsi bsi","public_published":"2026-04-10","public_updated":null,"public_display_date":"2026-04-10","public_sort_date":"2026-04-10","public_period_date":"2026-04-10"},{"id":"BSI:WID-SEC-2026-1044","cve":"","title":"OPNsense: Schwachstelle ermöglicht Offenlegung von Informationen","date":"2026-04-10","published":"2026-04-10","updated":null,"source_published":"2026-04-10","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1044","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1044","published":"2026-04-10","updated":"2026-04-10","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-13T09:01:31.367Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1044","added":"2026-04-10T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1044","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1044 opnsense: schwachstelle ermöglicht offenlegung von informationen bsi bsi","public_published":"2026-04-10","public_updated":null,"public_display_date":"2026-04-10","public_sort_date":"2026-04-10","public_period_date":"2026-04-10"},{"id":"BSI:WID-SEC-2026-1045","cve":"","title":"MISP: Mehrere Schwachstellen","date":"2026-04-10","published":"2026-04-10","updated":null,"source_published":"2026-04-10","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1045","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1045","published":"2026-04-10","updated":"2026-04-10","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-13T09:01:31.367Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1045","added":"2026-04-10T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1045","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1045 misp: mehrere schwachstellen bsi bsi","public_published":"2026-04-10","public_updated":null,"public_display_date":"2026-04-10","public_sort_date":"2026-04-10","public_period_date":"2026-04-10"},{"id":"BSI:WID-SEC-2026-1046","cve":"","title":"Dell EMC Isilon und EMC PowerScale OneFS: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen","date":"2026-04-10","published":"2026-04-10","updated":null,"source_published":"2026-04-10","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1046","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1046","published":"2026-04-10","updated":"2026-04-10","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-13T09:01:31.367Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1046","added":"2026-04-10T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1046","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1046 dell emc isilon und emc powerscale onefs: schwachstelle ermöglicht umgehen von sicherheitsvorkehrungen bsi bsi","public_published":"2026-04-10","public_updated":null,"public_display_date":"2026-04-10","public_sort_date":"2026-04-10","public_period_date":"2026-04-10"},{"id":"BSI:WID-SEC-2026-1049","cve":"","title":"Linux Kernel: Schwachstelle ermöglicht Denial of Service oder Codeausführung","date":"2026-04-10","published":"2026-04-10","updated":null,"source_published":"2026-04-10","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1049","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1049","published":"2026-04-10","updated":"2026-04-10","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-13T09:01:31.367Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1049","added":"2026-04-10T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1049","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1049 linux kernel: schwachstelle ermöglicht denial of service oder codeausführung bsi bsi","public_published":"2026-04-10","public_updated":null,"public_display_date":"2026-04-10","public_sort_date":"2026-04-10","public_period_date":"2026-04-10"},{"id":"BSI:WID-SEC-2026-1050","cve":"","title":"Checkmk: Mehrere Schwachstellen","date":"2026-04-10","published":"2026-04-10","updated":null,"source_published":"2026-04-10","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1050","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1050","published":"2026-04-10","updated":"2026-04-10","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-13T09:01:31.367Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1050","added":"2026-04-10T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1050","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1050 checkmk: mehrere schwachstellen bsi bsi","public_published":"2026-04-10","public_updated":null,"public_display_date":"2026-04-10","public_sort_date":"2026-04-10","public_period_date":"2026-04-10"},{"id":"BSI:WID-SEC-2024-0219","cve":"","title":"libTIFF: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-04-09","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0219","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-10T06:00:53.149Z","published":"2026-04-09","source_published":"2026-04-09","source_updated":null,"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0219","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"primary_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0219","primary_published":"2026-03-02","primary_updated":null,"primary_kind":"bsi_portal","primary_source":"BSI","primary_id":"BSI:WID-SEC-2024-0219","date_basis":"bsi_portal","link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0219","primaryUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0219","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0219","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2024-0219 libtiff: mehrere schwachstellen ermöglichen denial of service bsi bsi"},{"id":"BSI:WID-SEC-2024-1008","cve":"","title":"Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-04-09","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1008","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-10T06:00:53.149Z","published":"2026-04-09","source_published":"2026-04-09","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1008","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1008","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1008","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2024-1008 linux kernel: mehrere schwachstellen ermöglichen denial of service bsi bsi"},{"id":"BSI:WID-SEC-2024-1863","cve":"","title":"NGINX und NGINX Plus: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1863","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1863","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-10T06:00:53.149Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1863","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1863","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2024-1863 nginx und nginx plus: mehrere schwachstellen ermöglichen denial of service bsi bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09"},{"id":"BSI:WID-SEC-2024-3648","cve":"","title":"Red Hat Enterprise Linux pki-core: Mehrere Schwachstellen","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3648","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3648","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-10T06:00:53.149Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3648","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3648","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2024-3648 red hat enterprise linux pki-core: mehrere schwachstellen bsi bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09"},{"id":"BSI:WID-SEC-2025-1465","cve":"","title":"Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-04-09","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1465","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-10T06:00:53.149Z","published":"2026-04-09","source_published":"2026-04-09","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1465","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-03-25","source_doc_updated":"2026-03-25","cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1465","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1465","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2025-1465 linux kernel: mehrere schwachstellen ermöglichen denial of service bsi bsi"},{"id":"BSI:WID-SEC-2025-1517","cve":"","title":"Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-04-09","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1517","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-10T06:00:53.149Z","published":"2026-04-09","source_published":"2026-04-09","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1517","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-03-25","source_doc_updated":"2026-03-25","cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1517","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1517","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2025-1517 linux kernel: mehrere schwachstellen ermöglichen denial of service bsi bsi"},{"id":"BSI:WID-SEC-2025-2112","cve":"","title":"DNSdist: Schwachstelle ermöglicht Denial of Service","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2112","severity":"low","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2112","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-09T09:00:51.479Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2112","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2112","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09","severity_norm":"low","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2112 dnsdist: schwachstelle ermöglicht denial of service bsi bsi"},{"id":"BSI:WID-SEC-2026-0145","cve":"","title":"FreeRDP: Mehrere Schwachstellen ermöglichen DoS und Codeausführung","date":"2026-04-09","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0145","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-09T09:00:51.479Z","published":"2026-04-09","source_published":"2026-04-09","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0145","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0145","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0145","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0145 freerdp: mehrere schwachstellen ermöglichen dos und codeausführung bsi bsi"},{"id":"BSI:WID-SEC-2026-0164","cve":"","title":"Oracle Java SE: Mehrere Schwachstellen","date":"2026-04-09","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0164","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-10T06:00:53.149Z","published":"2026-04-09","source_published":"2026-04-09","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0164","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0164","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0164","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0164 oracle java se: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0244","cve":"","title":"FreeRDP: Mehrere Schwachstellen","date":"2026-04-09","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0244","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-09T09:00:51.479Z","published":"2026-04-09","source_published":"2026-04-09","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0244","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0244","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0244","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0244 freerdp: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0255","cve":"","title":"Ivanti Endpoint Manager Mobile: Mehrere Schwachstellen ermöglichen Codeausführung","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0255","severity":"critical","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0255","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-10T06:00:53.149Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0255","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0255","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"critical","search_text":"bsi:wid-sec-2026-0255 ivanti endpoint manager mobile: mehrere schwachstellen ermöglichen codeausführung bsi bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09"},{"id":"BSI:WID-SEC-2026-0409","cve":"","title":"PostgreSQL: Mehrere Schwachstellen","date":"2026-04-09","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0409","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-09T09:00:51.479Z","published":"2026-04-09","source_published":"2026-04-09","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0409","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0409","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0409","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0409 postgresql: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0650","cve":"","title":"Kubernetes (ingress-nginx): Schwachstelle ermöglicht Codeausführung","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0650","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0650","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-09T09:00:51.479Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0650","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0650","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-0650 kubernetes (ingress-nginx): schwachstelle ermöglicht codeausführung bsi bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09"},{"id":"BSI:WID-SEC-2026-0716","cve":"","title":"OpenSSH GSSAPI delta: Schwachstelle ermöglicht nicht spezifizierten Angriff","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0716","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0716","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-09T09:00:51.479Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0716","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0716","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0716 openssh gssapi delta: schwachstelle ermöglicht nicht spezifizierten angriff bsi bsi"},{"id":"BSI:WID-SEC-2026-0725","cve":"","title":"FreeRDP: Mehrere Schwachstellen","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0725","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0725","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-09T09:00:51.479Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0725","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0725","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0725 freerdp: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0729","cve":"","title":"OpenSSL: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0729","severity":"low","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0729","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-09T09:00:51.479Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0729","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0729","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09","severity_norm":"low","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0729 openssl: schwachstelle ermöglicht umgehen von sicherheitsvorkehrungen bsi bsi"},{"id":"BSI:WID-SEC-2026-0733","cve":"","title":"libexpat: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0733","severity":"low","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0733","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-09T09:00:51.479Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0733","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0733","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09","severity_norm":"low","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0733 libexpat: mehrere schwachstellen ermöglichen denial of service bsi bsi"},{"id":"BSI:WID-SEC-2026-0824","cve":"","title":"Python: Schwachstelle ermöglicht Codeausführung","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0824","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0824","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-09T09:00:51.479Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0824","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0824","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0824 python: schwachstelle ermöglicht codeausführung bsi bsi"},{"id":"BSI:WID-SEC-2026-0854","cve":"","title":"Squid: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0854","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0854","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-09T09:00:51.479Z","source_doc_published":"2026-03-25","source_doc_updated":"2026-03-25","cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0854","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0854","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0854 squid: mehrere schwachstellen ermöglichen denial of service bsi bsi"},{"id":"BSI:WID-SEC-2026-0879","cve":"","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0879","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0879","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-09T09:00:51.479Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0879","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0879","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0879 linux kernel: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0984","cve":"","title":"Dell PowerScale OneFS: Mehrere Schwachstellen","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0984","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0984","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-09T09:00:51.479Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0984","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0984","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-0984 dell powerscale onefs: mehrere schwachstellen bsi bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09"},{"id":"BSI:WID-SEC-2026-1000","cve":"","title":"Zammad: Mehrere Schwachstellen","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1000","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1000","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-09T09:00:51.479Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1000","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1000","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1000 zammad: mehrere schwachstellen bsi bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09"},{"id":"BSI:WID-SEC-2026-1010","cve":"","title":"GitLab CE/EE: Mehrere Schwachstellen","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1010","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1010","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-10T06:00:53.149Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1010","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1010","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1010 gitlab ce/ee: mehrere schwachstellen bsi bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09"},{"id":"BSI:WID-SEC-2026-1011","cve":"","title":"Vercel Next.js: Schwachstelle ermöglicht Denial of Service","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1011","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1011","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-10T06:00:53.149Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1011","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1011","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1011 vercel next.js: schwachstelle ermöglicht denial of service bsi bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09"},{"id":"BSI:WID-SEC-2026-1012","cve":"","title":"SonicWall SMA1000 : Mehrere Schwachstellen","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1012","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1012","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-10T06:00:53.149Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1012","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1012","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1012 sonicwall sma1000 : mehrere schwachstellen bsi bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09"},{"id":"BSI:WID-SEC-2026-1013","cve":"","title":"xwiki: Schwachstelle ermöglicht Codeausführung","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1013","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1013","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-10T06:00:53.149Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1013","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1013","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1013 xwiki: schwachstelle ermöglicht codeausführung bsi bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09"},{"id":"BSI:WID-SEC-2026-1014","cve":"","title":"Eclipse Jetty: Schwachstelle ermöglicht Privilegieneskalation","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1014","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1014","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-10T06:00:53.149Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1014","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1014","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1014 eclipse jetty: schwachstelle ermöglicht privilegieneskalation bsi bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09"},{"id":"BSI:WID-SEC-2026-1015","cve":"","title":"Fleet: Schwachstelle ermöglicht Privilegieneskalation","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1015","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1015","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-10T06:00:53.149Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1015","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1015","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1015 fleet: schwachstelle ermöglicht privilegieneskalation bsi bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09"},{"id":"BSI:WID-SEC-2026-1016","cve":"","title":"MinIO: Schwachstelle ermöglicht Denial of Service","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1016","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1016","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-10T06:00:53.149Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1016","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1016","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1016 minio: schwachstelle ermöglicht denial of service bsi bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09"},{"id":"BSI:WID-SEC-2026-1018","cve":"","title":"Drupal (Orejime): Schwachstelle ermöglicht Cross-Site Scripting","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1018","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1018","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-10T06:00:53.149Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1018","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1018","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1018 drupal (orejime): schwachstelle ermöglicht cross-site scripting bsi bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09"},{"id":"BSI:WID-SEC-2026-1020","cve":"","title":"Intel Prozessoren (Pentium Silver Series, Celeron J Series, und Celeron N series): Schwachstelle ermöglicht Privilegieneskalation","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1020","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1020","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-10T06:00:53.149Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1020","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1020","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1020 intel prozessoren (pentium silver series, celeron j series, und celeron n series): schwachstelle ermöglicht privilegieneskalation bsi bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09"},{"id":"BSI:WID-SEC-2026-1021","cve":"","title":"SugarCRM Sugar Enterprise: Mehrere Schwachstellen","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1021","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1021","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-10T06:00:53.149Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1021","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1021","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1021 sugarcrm sugar enterprise: mehrere schwachstellen bsi bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09"},{"id":"BSI:WID-SEC-2026-1022","cve":"","title":"Juniper Patchday April 2026: Mehrere Schwachstellen","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1022","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1022","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-10T06:00:53.149Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1022","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1022","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1022 juniper patchday april 2026: mehrere schwachstellen bsi bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09"},{"id":"BSI:WID-SEC-2026-1024","cve":"","title":"IBM DataPower Gateway: Schwachstelle ermöglicht Denial of Service","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1024","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1024","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-10T06:00:53.149Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1024","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1024","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1024 ibm datapower gateway: schwachstelle ermöglicht denial of service bsi bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09"},{"id":"BSI:WID-SEC-2026-1025","cve":"","title":"LogStash: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit den Rechten des Dienstes","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1025","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1025","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-10T06:00:53.149Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1025","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1025","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1025 logstash: schwachstelle ermöglicht ausführen von beliebigem programmcode mit den rechten des dienstes bsi bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09"},{"id":"BSI:WID-SEC-2026-1026","cve":"","title":"Mitel MiCollab: Mehrere Schwachstellen","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1026","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1026","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-10T06:00:53.149Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1026","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1026","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1026 mitel micollab: mehrere schwachstellen bsi bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09"},{"id":"BSI:WID-SEC-2026-1027","cve":"","title":"LangChain: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1027","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1027","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-10T06:00:53.149Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1027","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1027","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1027 langchain: schwachstelle ermöglicht umgehen von sicherheitsvorkehrungen bsi bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09"},{"id":"BSI:WID-SEC-2026-1028","cve":"","title":"Sonatype Nexus Repository Manager: Schwachstelle ermöglicht Cross-Site Scripting","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1028","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1028","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-10T06:00:53.149Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1028","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1028","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1028 sonatype nexus repository manager: schwachstelle ermöglicht cross-site scripting bsi bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09"},{"id":"BSI:WID-SEC-2026-1029","cve":"","title":"Kibana: Mehrere Schwachstellen","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1029","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1029","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-10T06:00:53.149Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1029","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1029","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1029 kibana: mehrere schwachstellen bsi bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09"},{"id":"BSI:WID-SEC-2026-1031","cve":"","title":"libTIFF: Schwachstelle ermöglicht Codeausführung und DoS","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1031","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1031","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-10T06:00:53.149Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1031","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1031","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1031 libtiff: schwachstelle ermöglicht codeausführung und dos bsi bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09"},{"id":"BSI:WID-SEC-2026-1032","cve":"","title":"IBM Tivoli Network Manager: Mehrere Schwachstellen","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1032","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1032","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-10T06:00:53.149Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1032","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1032","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1032 ibm tivoli network manager: mehrere schwachstellen bsi bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09"},{"id":"BSI:WID-SEC-2026-1033","cve":"","title":"Verschiedene Red Hat Produkte: Mehrere Schwachstellen ermöglichen Erlangen von Administratorrechten","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1033","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1033","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-10T06:00:53.149Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1033","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1033","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1033 verschiedene red hat produkte: mehrere schwachstellen ermöglichen erlangen von administratorrechten bsi bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09"},{"id":"BSI:WID-SEC-2026-1034","cve":"","title":"Proxmox Virtual Environment: Schwachstelle ermöglicht Offenlegung von Informationen","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1034","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1034","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-10T06:00:53.149Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1034","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1034","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1034 proxmox virtual environment: schwachstelle ermöglicht offenlegung von informationen bsi bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09"},{"id":"BSI:WID-SEC-2026-1035","cve":"","title":"OpenClaw: Mehrere Schwachstellen","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1035","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1035","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-10T06:00:53.149Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1035","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1035","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1035 openclaw: mehrere schwachstellen bsi bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09"},{"id":"BSI:WID-SEC-2026-1036","cve":"","title":"OpenCTI: Schwachstelle ermöglicht Codeausführung","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1036","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1036","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-10T06:00:53.149Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1036","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1036","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1036 opencti: schwachstelle ermöglicht codeausführung bsi bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09"},{"id":"BSI:WID-SEC-2026-1037","cve":"","title":"Linux Kernel: Schwachstelle ermöglicht Denial of Service","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1037","severity":"low","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1037","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-10T06:00:53.149Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1037","added":"2026-04-09T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1037","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"low","search_text":"bsi:wid-sec-2026-1037 linux kernel: schwachstelle ermöglicht denial of service bsi bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09"},{"id":"BSI:WID-SEC-W-2026-1030","cve":"CVE-2026-5858","title":"Google Chrome und Microsoft Edge: Mehrere Schwachstellen","date":"2026-04-08","published":"2026-04-08","updated":"2026-04-09","source_published":"2026-04-08","source_updated":"2026-04-09","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1030.json","summary":"WID-SEC-W-2026-1030 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1030","summary":"WID-SEC-2026-1030 - Portal Version","category":"self"},{"url":"https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","summary":"Google Chrome Stable Channel Update for Desktop vom 2026-04-07","category":"external"},{"url":"https://learn.microsoft.com/de-de/deployedge/microsoft-edge-relnotes-security#april-8-2026","summary":"Versionshinweise für Microsoft Edge-Sicherheitsupdates vom 2026-04-08","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2026-82b8678fe1","summary":"Fedora Security Advisory FEDORA-EPEL-2026-82B8678FE1 vom 2026-04-10","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2026-718899309a","summary":"Fedora Security Advisory FEDORA-EPEL-2026-718899309A vom 2026-04-10","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2026-4bb81189d7","summary":"Fedora Security Advisory FEDORA-EPEL-2026-4BB81189D7 vom 2026-04-10","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-2026-f0ab053633","summary":"Fedora Security Advisory FEDORA-2026-F0AB053633 vom 2026-04-10","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-2026-952f3c3d9e","summary":"Fedora Security Advisory FEDORA-2026-952F3C3D9E vom 2026-04-10","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-2026-900eef4571","summary":"Fedora Security Advisory FEDORA-2026-900EEF4571 vom 2026-04-10","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2026-f96b4915e2","summary":"Fedora Security Advisory FEDORA-EPEL-2026-F96B4915E2 vom 2026-04-10","category":"external"}],"severity":"high","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","published":"2026-04-08","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-13T06:01:30.852Z","sourceUrl":"https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","added":"2026-04-09T00:00:00.000Z","public_url":"https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-w-2026-1030 cve-2026-5858 google chrome und microsoft edge: mehrere schwachstellen bsi bsi","public_published":"2026-04-08","public_updated":"2026-04-09","public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09"},{"id":"BSI:WID-SEC-W-2026-1038","cve":"CVE-2026-24880","title":"Apache Tomcat und Tomcat Native: Mehrere Schwachstellen","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":"2026-04-09","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://tomcat.apache.org/security-9.html","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1038.json","summary":"WID-SEC-W-2026-1038 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1038","summary":"WID-SEC-2026-1038 - Portal Version","category":"self"},{"url":"https://tomcat.apache.org/security-9.html","summary":"Apache Tomcat 9 vulnerabilities vom 2026-04-09","category":"external"},{"url":"https://tomcat.apache.org/security-10.html","summary":"Apache Tomcat 10 vulnerabilities vom 2026-04-09","category":"external"},{"url":"https://tomcat.apache.org/security-11.html","summary":"Apache Tomcat 11 vulnerabilities vom 2026-04-09","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://tomcat.apache.org/security-9.html","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-10T09:01:20.963Z","sourceUrl":"https://tomcat.apache.org/security-9.html","added":"2026-04-09T00:00:00.000Z","public_url":"https://tomcat.apache.org/security-9.html","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-w-2026-1038 cve-2026-24880 apache tomcat und tomcat native: mehrere schwachstellen bsi bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09"},{"id":"BSI:WID-SEC-W-2026-1039","cve":"CVE-2026-25128","title":"IBM DataPower Gateway: Schwachstelle ermöglicht Denial of Service","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":"2026-04-09","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://www.ibm.com/support/pages/node/7269023","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1039.json","summary":"WID-SEC-W-2026-1039 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1039","summary":"WID-SEC-2026-1039 - Portal Version","category":"self"},{"url":"https://www.ibm.com/support/pages/node/7269023","summary":"IBM Security Bulletin 7269023 vom 2026-04-09","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://www.ibm.com/support/pages/node/7269023","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-10T09:01:20.963Z","sourceUrl":"https://www.ibm.com/support/pages/node/7269023","added":"2026-04-09T00:00:00.000Z","public_url":"https://www.ibm.com/support/pages/node/7269023","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-w-2026-1039 cve-2026-25128 ibm datapower gateway: schwachstelle ermöglicht denial of service bsi bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09"},{"id":"BSI:WID-SEC-W-2026-1040","cve":"CVE-2026-39304","title":"Apache ActiveMQ: Mehrere Schwachstellen","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":"2026-04-09","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://activemq.apache.org/security-advisories.data/CVE-2026-39304-announcement.txt","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1040.json","summary":"WID-SEC-W-2026-1040 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1040","summary":"WID-SEC-2026-1040 - Portal Version","category":"self"},{"url":"https://activemq.apache.org/security-advisories.data/CVE-2026-39304-announcement.txt","summary":"Apache CVE-2026-39304 announcement vom 2026-04-09","category":"external"},{"url":"https://activemq.apache.org/security-advisories.data/CVE-2026-40046-announcement.txt","summary":"Apache CVE-2026-40046 announcement vom 2026-04-09","category":"external"},{"url":"https://activemq.apache.org/components/classic/download/classic-05-19-05","summary":"ActiveMQ 5.19.5 Release vom 2026-04-09","category":"external"},{"url":"https://activemq.apache.org/components/classic/download/classic-06-02-04","summary":"ActiveMQ 6.2.4 Release vom 2026-04-09","category":"external"},{"url":"https://activemq.apache.org/components/classic/download/","summary":"Apple Security Advisory vom 2026-04-09","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://activemq.apache.org/security-advisories.data/CVE-2026-39304-announcement.txt","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-10T09:01:20.963Z","sourceUrl":"https://activemq.apache.org/security-advisories.data/CVE-2026-39304-announcement.txt","added":"2026-04-09T00:00:00.000Z","public_url":"https://activemq.apache.org/security-advisories.data/CVE-2026-39304-announcement.txt","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-w-2026-1040 cve-2026-39304 apache activemq: mehrere schwachstellen bsi bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09"},{"id":"BSI:WID-SEC-W-2026-1041","cve":"CVE-2026-22750","title":"VMware Tanzu Spring Cloud Gateway: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":"2026-04-09","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://spring.io/security/cve-2026-22750/","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1041.json","summary":"WID-SEC-W-2026-1041 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1041","summary":"WID-SEC-2026-1041 - Portal Version","category":"self"},{"url":"https://spring.io/security/cve-2026-22750/","summary":"Spring Security Advisory vom 2026-04-09","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://spring.io/security/cve-2026-22750/","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-10T09:01:20.963Z","sourceUrl":"https://spring.io/security/cve-2026-22750/","added":"2026-04-09T00:00:00.000Z","public_url":"https://spring.io/security/cve-2026-22750/","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-w-2026-1041 cve-2026-22750 vmware tanzu spring cloud gateway: schwachstelle ermöglicht umgehen von sicherheitsvorkehrungen bsi bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09"},{"id":"BSI:WID-SEC-W-2026-1042","cve":"CVE-2025-57735","title":"Apache Airflow: Mehrere Schwachstellen","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":"2026-04-09","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://github.com/advisories/GHSA-c92r-g8j5-vhcx","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1042.json","summary":"WID-SEC-W-2026-1042 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1042","summary":"WID-SEC-2026-1042 - Portal Version","category":"self"},{"url":"https://github.com/advisories/GHSA-c92r-g8j5-vhcx","summary":"GitHub Security Advisory GHSA-c92r-g8j5-vhcx vom 2026-04-09","category":"external"},{"url":"https://github.com/advisories/GHSA-C92R-G8J5-VHCX","summary":"GitHub Security Advisory GHSA-C92R-G8J5-VHCX vom 2026-04-09","category":"external"}],"severity":"high","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://github.com/advisories/GHSA-c92r-g8j5-vhcx","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-10T09:01:20.963Z","sourceUrl":"https://github.com/advisories/GHSA-c92r-g8j5-vhcx","added":"2026-04-09T00:00:00.000Z","public_url":"https://github.com/advisories/GHSA-c92r-g8j5-vhcx","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-w-2026-1042 cve-2025-57735 apache airflow: mehrere schwachstellen bsi bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09"},{"id":"BSI:WID-SEC-W-2026-1047","cve":"","title":"Adobe Acrobat Reader: Schwachstelle ermöglicht Erlangen von Administratorrechten","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":"2026-04-09","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://justhaifei1.blogspot.com/2026/04/expmon-detected-sophisticated-zero-day-adobe-reader.html","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1047.json","summary":"WID-SEC-W-2026-1047 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1047","summary":"WID-SEC-2026-1047 - Portal Version","category":"self"},{"url":"https://justhaifei1.blogspot.com/2026/04/expmon-detected-sophisticated-zero-day-adobe-reader.html","summary":"Blog Post vom 2026-04-09","category":"external"},{"url":"https://pub.expmon.com/analysis/328131/","summary":"Expmon Analysis vom 2026-04-09","category":"external"},{"url":"https://www.virustotal.com/gui/file/54077a5b15638e354fa02318623775b7a1cc0e8c21e59bcbab333035369e377f/detection","summary":"VirusTotal Detection vom 2026-04-09","category":"external"},{"url":"https://www.sophos.com/en-us/blog/adobe-reader-zero-day-vulnerability-in-active-exploitation","summary":"Sophos Blog vom 2026-04-09","category":"external"}],"severity":"critical","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":["last_affected"],"candidates":[{"url":"https://justhaifei1.blogspot.com/2026/04/expmon-detected-sophisticated-zero-day-adobe-reader.html","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-13T06:01:30.852Z","sourceUrl":"https://justhaifei1.blogspot.com/2026/04/expmon-detected-sophisticated-zero-day-adobe-reader.html","added":"2026-04-09T00:00:00.000Z","public_url":"https://justhaifei1.blogspot.com/2026/04/expmon-detected-sophisticated-zero-day-adobe-reader.html","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"critical","search_text":"bsi:wid-sec-w-2026-1047 adobe acrobat reader: schwachstelle ermöglicht erlangen von administratorrechten bsi bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09"},{"id":"BSI:WID-SEC-W-2026-1048","cve":"CVE-2026-35204","title":"helm: Mehrere Schwachstellen","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":"2026-04-09","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://github.com/helm/helm/releases/tag/v4.1.4","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1048.json","summary":"WID-SEC-W-2026-1048 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1048","summary":"WID-SEC-2026-1048 - Portal Version","category":"self"},{"url":"https://github.com/helm/helm/releases/tag/v4.1.4","summary":"Helm 4.1.4 Release Notes vom 2026-04-09","category":"external"},{"url":"https://github.com/helm/helm/security/advisories/GHSA-vmx8-mqv2-9gmg","summary":"GitHub Security Advisory GHSA-VMX8-MQV2-9GMG vom 2026-04-09","category":"external"},{"url":"https://github.com/helm/helm/security/advisories/GHSA-Q5JF-9VFQ-H4H7","summary":"GitHub Security Advisory GHSA-Q5JF-9VFQ-H4H7 vom 2026-04-09","category":"external"},{"url":"https://github.com/helm/helm/security/advisories/GHSA-HR2V-4R36-88HR","summary":"GitHub Security Advisory GHSA-HR2V-4R36-88HR vom 2026-04-09","category":"external"}],"severity":"high","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://github.com/helm/helm/releases/tag/v4.1.4","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-13T06:01:30.852Z","sourceUrl":"https://github.com/helm/helm/releases/tag/v4.1.4","added":"2026-04-09T00:00:00.000Z","public_url":"https://github.com/helm/helm/releases/tag/v4.1.4","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-w-2026-1048 cve-2026-35204 helm: mehrere schwachstellen bsi bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09"},{"id":"BSI:WID-SEC-W-2026-1049","cve":"CVE-2026-31412","title":"Linux Kernel: Schwachstelle ermöglicht Denial of Service oder Codeausführung","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":"2026-04-09","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://lore.kernel.org/linux-cve-announce/2026041044-CVE-2026-31412-bbc3@gregkh/T","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1049.json","summary":"WID-SEC-W-2026-1049 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1049","summary":"WID-SEC-2026-1049 - Portal Version","category":"self"},{"url":"https://lore.kernel.org/linux-cve-announce/2026041044-CVE-2026-31412-bbc3@gregkh/T","summary":"Linux Kernel CVE Announcement vom 2026-04-10","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://lore.kernel.org/linux-cve-announce/2026041044-CVE-2026-31412-bbc3@gregkh/T","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-13T06:01:30.852Z","sourceUrl":"https://lore.kernel.org/linux-cve-announce/2026041044-CVE-2026-31412-bbc3@gregkh/T","added":"2026-04-09T00:00:00.000Z","public_url":"https://lore.kernel.org/linux-cve-announce/2026041044-CVE-2026-31412-bbc3@gregkh/T","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-w-2026-1049 cve-2026-31412 linux kernel: schwachstelle ermöglicht denial of service oder codeausführung bsi bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09"},{"id":"BSI:WID-SEC-W-2026-1050","cve":"CVE-2026-33455","title":"Checkmk: Mehrere Schwachstellen","date":"2026-04-09","published":"2026-04-09","updated":null,"source_published":"2026-04-09","source_updated":"2026-04-09","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://checkmk.com/werk/17988","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1050.json","summary":"WID-SEC-W-2026-1050 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1050","summary":"WID-SEC-2026-1050 - Portal Version","category":"self"},{"url":"https://checkmk.com/werk/17988","summary":"CheckMK Wek #17988 vom 2026-04-09","category":"external"},{"url":"https://checkmk.com/werk/17989","summary":"CheckMK Wek #17989 vom 2026-04-09","category":"external"},{"url":"https://checkmk.com/werk/17990","summary":"CheckMK Wek #17990 vom 2026-04-09","category":"external"},{"url":"https://euvd.enisa.europa.eu/enisa/EUVD-2026-21342","summary":"EU Vulnerability Database EUVD-2026-21342","category":"external"},{"url":"https://euvd.enisa.europa.eu/enisa/EUVD-2026-21344","summary":"EU Vulnerability Database EUVD-2026-21344","category":"external"},{"url":"https://euvd.enisa.europa.eu/enisa/EUVD-2026-21346","summary":"EU Vulnerability Database EUVD-2026-21346","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://checkmk.com/werk/17988","published":"2026-04-09","updated":"2026-04-09","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-13T06:01:30.852Z","sourceUrl":"https://checkmk.com/werk/17988","added":"2026-04-09T00:00:00.000Z","public_url":"https://checkmk.com/werk/17988","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-w-2026-1050 cve-2026-33455 checkmk: mehrere schwachstellen bsi bsi","public_published":"2026-04-09","public_updated":null,"public_display_date":"2026-04-09","public_sort_date":"2026-04-09","public_period_date":"2026-04-09"},{"id":"BSI:WID-SEC-2026-0301","cve":"","title":"IBM App Connect Enterprise: Schwachstelle ermöglicht Denial of Service","date":"2026-04-08","published":"2026-04-08","updated":null,"source_published":"2026-04-08","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0301","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0301","published":"2026-04-08","updated":"2026-04-08","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-08T10:37:35.799Z","source_doc_published":"2026-03-25","source_doc_updated":"2026-03-25","cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0301","added":"2026-04-08T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0301","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-08","public_updated":null,"public_display_date":"2026-04-08","public_sort_date":"2026-04-08","public_period_date":"2026-04-08","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0301 ibm app connect enterprise: schwachstelle ermöglicht denial of service bsi bsi"},{"id":"BSI:WID-SEC-2026-0484","cve":"","title":"ImageMagick: Mehrere Schwachstellen","date":"2026-04-08","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0484","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-08T10:37:35.799Z","published":"2026-04-08","source_published":"2026-04-08","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0484","published":"2026-04-08","updated":"2026-04-08","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0484","added":"2026-04-08T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0484","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-08","public_updated":null,"public_display_date":"2026-04-08","public_sort_date":"2026-04-08","public_period_date":"2026-04-08","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0484 imagemagick: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0526","cve":"","title":"IBM App Connect Enterprise: Mehrere Schwachstellen","date":"2026-04-08","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0526","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-08T10:37:35.799Z","published":"2026-04-08","source_published":"2026-04-08","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0526","published":"2026-04-08","updated":"2026-04-08","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0526","added":"2026-04-08T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0526","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-08","public_updated":null,"public_display_date":"2026-04-08","public_sort_date":"2026-04-08","public_period_date":"2026-04-08","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0526 ibm app connect enterprise: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0643","cve":"","title":"ImageMagick: Mehrere Schwachstellen","date":"2026-04-08","published":"2026-04-08","updated":null,"source_published":"2026-04-08","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0643","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0643","published":"2026-04-08","updated":"2026-04-08","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-09T06:00:53.683Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0643","added":"2026-04-08T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0643","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-08","public_updated":null,"public_display_date":"2026-04-08","public_sort_date":"2026-04-08","public_period_date":"2026-04-08","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0643 imagemagick: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0688","cve":"","title":"cPanel cPanel/WHM: Mehrere Schwachstellen","date":"2026-04-08","published":"2026-04-08","updated":null,"source_published":"2026-04-08","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0688","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0688","published":"2026-04-08","updated":"2026-04-08","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-09T06:00:53.683Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0688","added":"2026-04-08T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0688","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-08","public_updated":null,"public_display_date":"2026-04-08","public_sort_date":"2026-04-08","public_period_date":"2026-04-08","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0688 cpanel cpanel/whm: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0714","cve":"","title":"ImageMagick: Schwachstelle ermöglicht nicht spezifizierten Angriff","date":"2026-04-08","published":"2026-04-08","updated":null,"source_published":"2026-04-08","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0714","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0714","published":"2026-04-08","updated":"2026-04-08","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-09T06:00:53.683Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0714","added":"2026-04-08T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0714","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-08","public_updated":null,"public_display_date":"2026-04-08","public_sort_date":"2026-04-08","public_period_date":"2026-04-08","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0714 imagemagick: schwachstelle ermöglicht nicht spezifizierten angriff bsi bsi"},{"id":"BSI:WID-SEC-2026-0722","cve":"","title":"CPython: Schwachstelle ermöglicht Manipulation von Dateien","date":"2026-04-08","published":"2026-04-08","updated":null,"source_published":"2026-04-08","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0722","severity":"low","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0722","published":"2026-04-08","updated":"2026-04-08","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-09T06:00:53.683Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0722","added":"2026-04-08T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0722","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"low","search_text":"bsi:wid-sec-2026-0722 cpython: schwachstelle ermöglicht manipulation von dateien bsi bsi","public_published":"2026-04-08","public_updated":null,"public_display_date":"2026-04-08","public_sort_date":"2026-04-08","public_period_date":"2026-04-08"},{"id":"BSI:WID-SEC-2026-0741","cve":"","title":"CPython: Mehrere Schwachstellen ermöglichen Manipulation von Dateien und DoS","date":"2026-04-08","published":"2026-04-08","updated":null,"source_published":"2026-04-08","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0741","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0741","published":"2026-04-08","updated":"2026-04-08","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-09T06:00:53.683Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0741","added":"2026-04-08T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0741","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-08","public_updated":null,"public_display_date":"2026-04-08","public_sort_date":"2026-04-08","public_period_date":"2026-04-08","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0741 cpython: mehrere schwachstellen ermöglichen manipulation von dateien und dos bsi bsi"},{"id":"BSI:WID-SEC-2026-0744","cve":"","title":"ImageMagick: Schwachstelle ermöglicht Denial of Service","date":"2026-04-08","published":"2026-04-08","updated":null,"source_published":"2026-04-08","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0744","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0744","published":"2026-04-08","updated":"2026-04-08","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-09T06:00:53.683Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0744","added":"2026-04-08T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0744","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-08","public_updated":null,"public_display_date":"2026-04-08","public_sort_date":"2026-04-08","public_period_date":"2026-04-08","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0744 imagemagick: schwachstelle ermöglicht denial of service bsi bsi"},{"id":"BSI:WID-SEC-2026-0769","cve":"","title":"Red Hat Enterprise Linux (capstone) und OpenShift (rhcos): Mehrere Schwachstellen","date":"2026-04-08","published":"2026-04-08","updated":null,"source_published":"2026-04-08","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0769","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0769","published":"2026-04-08","updated":"2026-04-08","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-09T06:00:53.683Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0769","added":"2026-04-08T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0769","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-08","public_updated":null,"public_display_date":"2026-04-08","public_sort_date":"2026-04-08","public_period_date":"2026-04-08","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0769 red hat enterprise linux (capstone) und openshift (rhcos): mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0772","cve":"","title":"IBM App Connect Enterprise (fast-xml-parser): Mehrere Schwachstellen","date":"2026-04-08","published":"2026-04-08","updated":null,"source_published":"2026-04-08","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0772","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0772","published":"2026-04-08","updated":"2026-04-08","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-09T06:00:53.683Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0772","added":"2026-04-08T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0772","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-08","public_updated":null,"public_display_date":"2026-04-08","public_sort_date":"2026-04-08","public_period_date":"2026-04-08","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0772 ibm app connect enterprise (fast-xml-parser): mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0802","cve":"","title":"GIMP: Mehrere Schwachstellen ermöglichen Codeausführung","date":"2026-04-08","published":"2026-04-08","updated":null,"source_published":"2026-04-08","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0802","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0802","published":"2026-04-08","updated":"2026-04-08","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-09T06:00:53.683Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0802","added":"2026-04-08T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0802","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-08","public_updated":null,"public_display_date":"2026-04-08","public_sort_date":"2026-04-08","public_period_date":"2026-04-08","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0802 gimp: mehrere schwachstellen ermöglichen codeausführung bsi bsi"},{"id":"BSI:WID-SEC-2026-0835","cve":"","title":"cPanel cPanel/WHM: Mehrere Schwachstellen","date":"2026-04-08","published":"2026-04-08","updated":null,"source_published":"2026-04-08","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0835","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0835","published":"2026-04-08","updated":"2026-04-08","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-09T06:00:53.683Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0835","added":"2026-04-08T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0835","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-08","public_updated":null,"public_display_date":"2026-04-08","public_sort_date":"2026-04-08","public_period_date":"2026-04-08","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0835 cpanel cpanel/whm: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0849","cve":"","title":"ImageMagick: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-04-08","published":"2026-04-08","updated":null,"source_published":"2026-04-08","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0849","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0849","published":"2026-04-08","updated":"2026-04-08","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-09T06:00:53.683Z","source_doc_published":"2026-03-25","source_doc_updated":"2026-03-25","cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0849","added":"2026-04-08T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0849","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-08","public_updated":null,"public_display_date":"2026-04-08","public_sort_date":"2026-04-08","public_period_date":"2026-04-08","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0849 imagemagick: mehrere schwachstellen ermöglichen denial of service bsi bsi"},{"id":"BSI:WID-SEC-2026-0903","cve":"","title":"IBM App Connect Enterprise: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-04-08","published":"2026-04-08","updated":null,"source_published":"2026-04-08","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0903","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0903","published":"2026-04-08","updated":"2026-04-08","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-09T06:00:53.683Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0903","added":"2026-04-08T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0903","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-08","public_updated":null,"public_display_date":"2026-04-08","public_sort_date":"2026-04-08","public_period_date":"2026-04-08","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0903 ibm app connect enterprise: mehrere schwachstellen ermöglichen denial of service bsi bsi"},{"id":"BSI:WID-SEC-2026-0939","cve":"","title":"cPanel cPanel/WHM (perl-YAML-Syck): Schwachstelle ermöglicht Codeausführung und DoS","date":"2026-04-08","published":"2026-04-08","updated":null,"source_published":"2026-04-08","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0939","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0939","published":"2026-04-08","updated":"2026-04-08","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-09T06:00:53.683Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0939","added":"2026-04-08T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0939","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-08","public_updated":null,"public_display_date":"2026-04-08","public_sort_date":"2026-04-08","public_period_date":"2026-04-08","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0939 cpanel cpanel/whm (perl-yaml-syck): schwachstelle ermöglicht codeausführung und dos bsi bsi"},{"id":"BSI:WID-SEC-2026-0949","cve":"","title":"IBM Security Verify Access: Mehrere Schwachstellen","date":"2026-04-08","published":"2026-04-08","updated":null,"source_published":"2026-04-08","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0949","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0949","published":"2026-04-08","updated":"2026-04-08","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-09T06:00:53.683Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0949","added":"2026-04-08T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0949","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-08","public_updated":null,"public_display_date":"2026-04-08","public_sort_date":"2026-04-08","public_period_date":"2026-04-08","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0949 ibm security verify access: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0982","cve":"","title":"OpenBSD: Schwachstelle ermöglicht nicht spezifizierten Angriff","date":"2026-04-08","published":"2026-04-08","updated":null,"source_published":"2026-04-08","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0982","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0982","published":"2026-04-08","updated":"2026-04-08","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-08T09:00:52.459Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0982","added":"2026-04-08T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0982","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-0982 openbsd: schwachstelle ermöglicht nicht spezifizierten angriff bsi bsi","public_published":"2026-04-08","public_updated":null,"public_display_date":"2026-04-08","public_sort_date":"2026-04-08","public_period_date":"2026-04-08"},{"id":"BSI:WID-SEC-2026-0988","cve":"","title":"D-LINK Router M60 und DIR-3040: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen","date":"2026-04-08","published":"2026-04-08","updated":null,"source_published":"2026-04-08","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0988","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0988","published":"2026-04-08","updated":"2026-04-08","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-09T06:00:53.683Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0988","added":"2026-04-08T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0988","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-0988 d-link router m60 und dir-3040: schwachstelle ermöglicht umgehen von sicherheitsvorkehrungen bsi bsi","public_published":"2026-04-08","public_updated":null,"public_display_date":"2026-04-08","public_sort_date":"2026-04-08","public_period_date":"2026-04-08"},{"id":"BSI:WID-SEC-2026-0989","cve":"","title":"Red Hat Enterprise Linux (microcode_ctl): Schwachstelle ermöglicht Privilegieneskalation","date":"2026-04-08","published":"2026-04-08","updated":null,"source_published":"2026-04-08","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0989","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0989","published":"2026-04-08","updated":"2026-04-08","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-09T06:00:53.683Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0989","added":"2026-04-08T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0989","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-0989 red hat enterprise linux (microcode_ctl): schwachstelle ermöglicht privilegieneskalation bsi bsi","public_published":"2026-04-08","public_updated":null,"public_display_date":"2026-04-08","public_sort_date":"2026-04-08","public_period_date":"2026-04-08"},{"id":"BSI:WID-SEC-2026-0990","cve":"","title":"Budibase: Mehrere Schwachstellen","date":"2026-04-08","published":"2026-04-08","updated":null,"source_published":"2026-04-08","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0990","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0990","published":"2026-04-08","updated":"2026-04-08","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-09T06:00:53.683Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0990","added":"2026-04-08T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0990","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-0990 budibase: mehrere schwachstellen bsi bsi","public_published":"2026-04-08","public_updated":null,"public_display_date":"2026-04-08","public_sort_date":"2026-04-08","public_period_date":"2026-04-08"},{"id":"BSI:WID-SEC-2026-0992","cve":"","title":"Podman Desktop: Schwachstelle ermöglicht Denial of Service und Offenlegung von Informationen","date":"2026-04-08","published":"2026-04-08","updated":null,"source_published":"2026-04-08","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0992","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0992","published":"2026-04-08","updated":"2026-04-08","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-09T06:00:53.683Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0992","added":"2026-04-08T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0992","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-0992 podman desktop: schwachstelle ermöglicht denial of service und offenlegung von informationen bsi bsi","public_published":"2026-04-08","public_updated":null,"public_display_date":"2026-04-08","public_sort_date":"2026-04-08","public_period_date":"2026-04-08"},{"id":"BSI:WID-SEC-2026-0993","cve":"","title":"docker: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen","date":"2026-04-08","published":"2026-04-08","updated":null,"source_published":"2026-04-08","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0993","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0993","published":"2026-04-08","updated":"2026-04-08","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-09T06:00:53.683Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0993","added":"2026-04-08T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0993","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-0993 docker: schwachstelle ermöglicht umgehen von sicherheitsvorkehrungen bsi bsi","public_published":"2026-04-08","public_updated":null,"public_display_date":"2026-04-08","public_sort_date":"2026-04-08","public_period_date":"2026-04-08"},{"id":"BSI:WID-SEC-2026-0996","cve":"","title":"Apache Kafka: Schwachstelle ermöglicht Offenlegung von Informationen","date":"2026-04-08","published":"2026-04-08","updated":null,"source_published":"2026-04-08","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0996","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0996","published":"2026-04-08","updated":"2026-04-08","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-09T06:00:53.683Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0996","added":"2026-04-08T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0996","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-0996 apache kafka: schwachstelle ermöglicht offenlegung von informationen bsi bsi","public_published":"2026-04-08","public_updated":null,"public_display_date":"2026-04-08","public_sort_date":"2026-04-08","public_period_date":"2026-04-08"},{"id":"BSI:WID-SEC-2026-1001","cve":"","title":"Snipe-IT: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen und potenziell Cross-Site Scripting","date":"2026-04-08","published":"2026-04-08","updated":null,"source_published":"2026-04-08","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1001","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1001","published":"2026-04-08","updated":"2026-04-08","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-09T06:00:53.683Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1001","added":"2026-04-08T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1001","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1001 snipe-it: mehrere schwachstellen ermöglichen umgehen von sicherheitsvorkehrungen und potenziell cross-site scripting bsi bsi","public_published":"2026-04-08","public_updated":null,"public_display_date":"2026-04-08","public_sort_date":"2026-04-08","public_period_date":"2026-04-08"},{"id":"BSI:WID-SEC-2026-1003","cve":"","title":"GStreamer: Mehrere Schwachstellen","date":"2026-04-08","published":"2026-04-08","updated":null,"source_published":"2026-04-08","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1003","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1003","published":"2026-04-08","updated":"2026-04-08","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-09T06:00:53.683Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1003","added":"2026-04-08T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1003","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-1003 gstreamer: mehrere schwachstellen bsi bsi","public_published":"2026-04-08","public_updated":null,"public_display_date":"2026-04-08","public_sort_date":"2026-04-08","public_period_date":"2026-04-08"},{"id":"BSI:WID-SEC-2026-1005","cve":"","title":"OpenClaw: Mehrere Schwachstellen","date":"2026-04-08","published":"2026-04-08","updated":null,"source_published":"2026-04-08","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1005","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1005","published":"2026-04-08","updated":"2026-04-08","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-09T06:00:53.683Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1005","added":"2026-04-08T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1005","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1005 openclaw: mehrere schwachstellen bsi bsi","public_published":"2026-04-08","public_updated":null,"public_display_date":"2026-04-08","public_sort_date":"2026-04-08","public_period_date":"2026-04-08"},{"id":"BSI:WID-SEC-2026-1007","cve":"","title":"IBM App Connect Enterprise: Mehrere Schwachstellen","date":"2026-04-08","published":"2026-04-08","updated":null,"source_published":"2026-04-08","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1007","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1007","published":"2026-04-08","updated":"2026-04-08","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-09T06:00:53.683Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1007","added":"2026-04-08T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1007","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1007 ibm app connect enterprise: mehrere schwachstellen bsi bsi","public_published":"2026-04-08","public_updated":null,"public_display_date":"2026-04-08","public_sort_date":"2026-04-08","public_period_date":"2026-04-08"},{"id":"BSI:WID-SEC-2026-1009","cve":"","title":"Apache Cassandra: Mehrere Schwachstellen","date":"2026-04-08","published":"2026-04-08","updated":null,"source_published":"2026-04-08","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1009","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1009","published":"2026-04-08","updated":"2026-04-08","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-09T06:00:53.683Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1009","added":"2026-04-08T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1009","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-1009 apache cassandra: mehrere schwachstellen bsi bsi","public_published":"2026-04-08","public_updated":null,"public_display_date":"2026-04-08","public_sort_date":"2026-04-08","public_period_date":"2026-04-08"},{"id":"BSI:WID-SEC-W-2024-1008","cve":"CVE-2022-48669","title":"Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2024-05-01","published":"2024-05-01","updated":"2026-04-08","source_published":"2024-05-01","source_updated":"2026-04-08","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://access.redhat.com/errata/RHSA-2024:2627","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1008.json","summary":"WID-SEC-W-2024-1008 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1008","summary":"WID-SEC-2024-1008 - Portal Version","category":"self"},{"url":"https://access.redhat.com/errata/RHSA-2024:2627","summary":"Red Hat Security Advisory RHSA-2024:2627 vom 2024-05-01","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:2628","summary":"Red Hat Security Advisory RHSA-2024:2628 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050131-CVE-2022-48669-15cf@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2022-48669 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050119-CVE-2023-52647-82e4@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2023-52647 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050122-CVE-2023-52648-4e0d@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2023-52648 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050109-CVE-2023-52649-4614@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2023-52649 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050109-CVE-2023-52650-e2d1@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2023-52650 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050110-CVE-2023-52651-5907@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2023-52651 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050131-CVE-2023-52652-9e84@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2023-52652 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050131-CVE-2023-52653-a5c2@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2023-52653 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050122-CVE-2024-26929-07f0@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26929 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050122-CVE-2024-26930-4f3e@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26930 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050123-CVE-2024-26931-01d9@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26931 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050123-CVE-2024-26932-587d@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26932 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050123-CVE-2024-26933-c18d@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26933 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050123-CVE-2024-26934-e2fc@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26934 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050124-CVE-2024-26935-8b4e@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26935 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050141-CVE-2024-26936-0264@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26936 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050124-CVE-2024-26937-3d21@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26937 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050124-CVE-2024-26938-b3f9@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26938 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050124-CVE-2024-26939-5314@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26939 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050125-CVE-2024-26940-1785@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26940 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050125-CVE-2024-26941-7c68@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26941 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050125-CVE-2024-26942-2f72@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26942 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050125-CVE-2024-26943-9ea5@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26943 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050125-CVE-2024-26944-598c@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26944 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050126-CVE-2024-26945-bf47@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26945 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050126-CVE-2024-26946-ad5d@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26946 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050126-CVE-2024-26947-c9b8@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26947 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050126-CVE-2024-26948-43bb@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26948 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050127-CVE-2024-26949-cf74@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26949 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050127-CVE-2024-26950-4424@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26950 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050127-CVE-2024-26951-5cbe@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26951 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050127-CVE-2024-26952-7f65@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26952 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050128-CVE-2024-26953-8304@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26953 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050128-CVE-2024-26954-18d5@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26954 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050128-CVE-2024-26955-3205@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26955 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050128-CVE-2024-26956-94b7@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26956 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050129-CVE-2024-26957-9e6b@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26957 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050129-CVE-2024-26958-6c15@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26958 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050129-CVE-2024-26959-cbbc@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26959 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050129-CVE-2024-26960-ad6b@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26960 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050129-CVE-2024-26961-408d@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26961 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050130-CVE-2024-26962-cbb0@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26962 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050130-CVE-2024-26963-3eac@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26963 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050130-CVE-2024-26964-54c8@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26964 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050130-CVE-2024-26965-a43f@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26965 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050131-CVE-2024-26966-1afc@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26966 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050131-CVE-2024-26967-3ccc@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26967 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050131-CVE-2024-26968-bd35@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26968 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050131-CVE-2024-26969-13cf@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26969 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050132-CVE-2024-26970-ad9a@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26970 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050132-CVE-2024-26971-6e28@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26971 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050132-CVE-2024-26972-bf6c@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26972 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050132-CVE-2024-26973-54a3@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26973 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050132-CVE-2024-26974-13eb@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26974 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050133-CVE-2024-26975-d184@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26975 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050133-CVE-2024-26976-60d4@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26976 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050133-CVE-2024-26977-cf63@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26977 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050133-CVE-2024-26978-cc0d@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26978 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050134-CVE-2024-26979-43e8@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26979 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050141-CVE-2024-26980-4b16@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26980 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050141-CVE-2024-26981-db53@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26981 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050141-CVE-2024-26982-8675@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26982 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050142-CVE-2024-26983-9424@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26983 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050142-CVE-2024-26984-3028@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26984 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050142-CVE-2024-26985-37ac@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26985 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050142-CVE-2024-26986-4650@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26986 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050143-CVE-2024-26987-507c@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26987 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050143-CVE-2024-26988-c304@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26988 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050143-CVE-2024-26989-851d@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26989 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050143-CVE-2024-26990-0a1f@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26990 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050144-CVE-2024-26991-f6d3@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26991 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050144-CVE-2024-26992-4f0e@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26992 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050144-CVE-2024-26993-fe52@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26993 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050144-CVE-2024-26994-43c6@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26994 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050144-CVE-2024-26995-ac9b@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26995 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050145-CVE-2024-26996-ff2f@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26996 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050145-CVE-2024-26997-b8bf@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26997 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050145-CVE-2024-26998-2262@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26998 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050145-CVE-2024-26999-057f@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-26999 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050146-CVE-2024-27000-c789@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27000 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050146-CVE-2024-27001-16ca@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27001 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050146-CVE-2024-27002-3b11@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27002 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050146-CVE-2024-27003-c862@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27003 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050147-CVE-2024-27004-c429@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27004 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050147-CVE-2024-27005-e630@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27005 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050147-CVE-2024-27006-3b6f@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27006 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050147-CVE-2024-27007-686b@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27007 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050148-CVE-2024-27008-5964@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27008 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050148-CVE-2024-27009-d63d@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27009 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050148-CVE-2024-27010-5a68@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27010 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050148-CVE-2024-27011-2c70@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27011 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050148-CVE-2024-27012-5564@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27012 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050149-CVE-2024-27013-2c26@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27013 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050149-CVE-2024-27014-d2dc@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27014 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050149-CVE-2024-27015-9ce1@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27015 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050149-CVE-2024-27016-5114@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27016 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050150-CVE-2024-27017-d867@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27017 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050150-CVE-2024-27018-d8a7@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27018 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050150-CVE-2024-27019-e3d4@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27019 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050150-CVE-2024-27020-5158@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27020 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050151-CVE-2024-27021-6a83@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27021 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050143-CVE-2024-27022-4325@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27022 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050105-CVE-2024-27023-4810@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27023 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050107-CVE-2024-27024-efbd@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27024 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050107-CVE-2024-27025-babd@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27025 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050108-CVE-2024-27026-189b@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27026 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050108-CVE-2024-27027-ba6a@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27027 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050110-CVE-2024-27028-42f0@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27028 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050110-CVE-2024-27029-69f0@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27029 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050110-CVE-2024-27030-d75a@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27030 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050110-CVE-2024-27031-2e85@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27031 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050111-CVE-2024-27032-97a9@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27032 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050111-CVE-2024-27033-d152@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27033 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050111-CVE-2024-27034-5872@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27034 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050111-CVE-2024-27035-1628@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27035 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050111-CVE-2024-27036-6ba3@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27036 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050112-CVE-2024-27037-d54a@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27037 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050112-CVE-2024-27038-3af3@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27038 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050112-CVE-2024-27039-3730@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27039 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050112-CVE-2024-27040-e45b@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27040 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050112-CVE-2024-27041-7bf4@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27041 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050113-CVE-2024-27042-e812@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27042 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050113-CVE-2024-27043-f2fb@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27043 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050113-CVE-2024-27044-7e0e@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27044 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050113-CVE-2024-27045-6680@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27045 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050113-CVE-2024-27046-4694@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27046 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050114-CVE-2024-27047-8aad@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27047 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050114-CVE-2024-27048-016f@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27048 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050114-CVE-2024-27049-a5a1@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27049 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050114-CVE-2024-27050-b829@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27050 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050114-CVE-2024-27051-07ce@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27051 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050115-CVE-2024-27052-fb6d@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27052 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050115-CVE-2024-27053-a8e9@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27053 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050115-CVE-2024-27054-b0ff@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27054 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050115-CVE-2024-27055-449e@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27055 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050115-CVE-2024-27056-98c0@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27056 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050116-CVE-2024-27057-c0fb@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27057 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050130-CVE-2024-27058-e8f6@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27058 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050130-CVE-2024-27059-baaa@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27059 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050130-CVE-2024-27060-8a1c@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27060 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050130-CVE-2024-27061-fef2@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27061 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050130-CVE-2024-27062-3291@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27062 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050131-CVE-2024-27063-c356@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27063 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050132-CVE-2024-27064-8046@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27064 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050132-CVE-2024-27065-8c9d@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27065 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050132-CVE-2024-27066-686a@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27066 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050132-CVE-2024-27067-38e7@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27067 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050132-CVE-2024-27068-c844@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27068 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050133-CVE-2024-27069-5b70@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27069 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050133-CVE-2024-27070-a43e@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27070 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050133-CVE-2024-27071-3b1b@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27071 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050133-CVE-2024-27072-301d@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27072 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050133-CVE-2024-27073-967c@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27073 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050133-CVE-2024-27074-a9b3@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27074 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050134-CVE-2024-27075-5e4f@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27075 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050134-CVE-2024-27076-5a2e@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27076 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050134-CVE-2024-27077-3482@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27077 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050134-CVE-2024-27078-6a54@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27078 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050134-CVE-2024-27079-f478@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27079 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050135-CVE-2024-27080-46f0@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27080 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050135-CVE-2024-27388-04eb@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27388 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050135-CVE-2024-27389-fb3a@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27389 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050135-CVE-2024-27390-e55f@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27390 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050135-CVE-2024-27391-6014@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27391 vom 2024-05-01","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024050136-CVE-2024-27392-b84b@gregkh/T/","summary":"Linux CVE Announce Mailing List CVE-2024-27392 vom 2024-05-01","category":"external"},{"url":"https://kernel.org/","summary":"Kernel Updates vom 2024-05-01","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-May/018445.html","summary":"SUSE Security Update SUSE-SU-2024:1490-1 vom 2024-05-03","category":"external"},{"url":"https://lists.debian.org/debian-security-announce/2024/msg00090.html","summary":"Debian Security Advisory DSA-5681 vom 2024-05-06","category":"external"},{"url":"https://lists.debian.org/debian-security-announce/2024/msg00089.html","summary":"Debian Security Advisory DSA-5680 vom 2024-05-06","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:2758","summary":"Red Hat Security Advisory RHSA-2024:2758 vom 2024-05-08","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-2758.html","summary":"Oracle Linux Security Advisory ELSA-2024-2758 vom 2024-05-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-May/018528.html","summary":"SUSE Security Update SUSE-SU-2024:1644-1 vom 2024-05-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-May/018524.html","summary":"SUSE Security Update SUSE-SU-2024:1648-1 vom 2024-05-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-May/018529.html","summary":"SUSE Security Update SUSE-SU-2024:1643-1 vom 2024-05-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-May/018526.html","summary":"SUSE Security Update SUSE-SU-2024:1646-1 vom 2024-05-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-May/018527.html","summary":"SUSE Security Update SUSE-SU-2024:1645-1 vom 2024-05-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-May/018525.html","summary":"SUSE Security Update SUSE-SU-2024:1647-1 vom 2024-05-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-May/018530.html","summary":"SUSE Security Update SUSE-SU-2024:1642-1 vom 2024-05-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-May/018531.html","summary":"SUSE Security Update SUSE-SU-2024:1641-1 vom 2024-05-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-May/018533.html","summary":"SUSE Security Update SUSE-SU-2024:1650-1 vom 2024-05-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-May/018538.html","summary":"SUSE Security Update SUSE-SU-2024:1659-1 vom 2024-05-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-May/018572.html","summary":"SUSE Security Update SUSE-SU-2024:1648-2 vom 2024-05-21","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:3138","summary":"Red Hat Security Advisory RHSA-2024:3138 vom 2024-05-22","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:2950","summary":"Red Hat Security Advisory RHSA-2024:2950 vom 2024-05-22","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:3421","summary":"Red Hat Security Advisory RHSA-2024:3421 vom 2024-05-28","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:3461","summary":"Red Hat Security Advisory RHSA-2024:3461 vom 2024-05-29","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:3460","summary":"Red Hat Security Advisory RHSA-2024:3460 vom 2024-05-29","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-May/018634.html","summary":"SUSE Security Update SUSE-SU-2024:1870-1 vom 2024-05-30","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:3618","summary":"Red Hat Security Advisory RHSA-2024:3618 vom 2024-06-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:3619","summary":"Red Hat Security Advisory RHSA-2024:3619 vom 2024-06-05","category":"external"},{"url":"https://oss.oracle.com/pipermail/el-errata/2024-June/015802.html","summary":"Oracle Linux Security Advisory ELSA-2024-12377 vom 2024-06-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:3627","summary":"Red Hat Security Advisory RHSA-2024:3627 vom 2024-06-05","category":"external"},{"url":"https://oss.oracle.com/pipermail/el-errata/2024-June/015807.html","summary":"Oracle Linux Security Advisory ELSA-2024-12385 vom 2024-06-05","category":"external"},{"url":"http://linux.oracle.com/errata/ELSA-2024-3619.html","summary":"Oracle Linux Security Advisory ELSA-2024-3619 vom 2024-06-07","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-3618.html","summary":"Oracle Linux Security Advisory ELSA-2024-3618 vom 2024-06-06","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6821-1","summary":"Ubuntu Security Notice USN-6821-1 vom 2024-06-08","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6817-1","summary":"Ubuntu Security Notice USN-6817-1 vom 2024-06-08","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6820-1","summary":"Ubuntu Security Notice USN-6820-1 vom 2024-06-08","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6816-1","summary":"Ubuntu Security Notice USN-6816-1 vom 2024-06-08","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7156774","summary":"IBM Security Bulletin 7156774 vom 2024-06-07","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6821-2","summary":"Ubuntu Security Notice USN-6821-2 vom 2024-06-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018685.html","summary":"SUSE Security Update SUSE-SU-2024:1979-1 vom 2024-06-11","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018686.html","summary":"SUSE Security Update SUSE-SU-2024:1978-1 vom 2024-06-11","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6828-1","summary":"Ubuntu Security Notice USN-6828-1 vom 2024-06-11","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6817-2","summary":"Ubuntu Security Notice USN-6817-2 vom 2024-06-11","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018700.html","summary":"SUSE Security Update SUSE-SU-2024:1983-1 vom 2024-06-11","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:3810","summary":"Red Hat Security Advisory RHSA-2024:3810 vom 2024-06-11","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6821-3","summary":"Ubuntu Security Notice USN-6821-3 vom 2024-06-11","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6820-2","summary":"Ubuntu Security Notice USN-6820-2 vom 2024-06-11","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018706.html","summary":"SUSE Security Update SUSE-SU-2024:2008-1 vom 2024-06-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018711.html","summary":"SUSE Security Update SUSE-SU-2024:2010-1 vom 2024-06-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018710.html","summary":"SUSE Security Update SUSE-SU-2024:2011-1 vom 2024-06-12","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6821-4","summary":"Ubuntu Security Notice USN-6821-4 vom 2024-06-14","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6817-3","summary":"Ubuntu Security Notice USN-6817-3 vom 2024-06-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018783.html","summary":"SUSE Security Update SUSE-SU-2024:2135-1 vom 2024-06-21","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018808.html","summary":"SUSE Security Update SUSE-SU-2024:2183-1 vom 2024-06-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018807.html","summary":"SUSE Security Update SUSE-SU-2024:2184-1 vom 2024-06-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018809.html","summary":"SUSE Security Update SUSE-SU-2024:2185-1 vom 2024-06-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018811.html","summary":"SUSE Security Update SUSE-SU-2024:2189-1 vom 2024-06-25","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html","summary":"Debian Security Advisory DLA-3842 vom 2024-06-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018819.html","summary":"SUSE Security Update SUSE-SU-2024:2190-1 vom 2024-06-25","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4107","summary":"Red Hat Security Advisory RHSA-2024:4107 vom 2024-06-26","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html","summary":"Debian Security Advisory DLA-3840 vom 2024-06-27","category":"external"},{"url":"https://alas.aws.amazon.com/AL2023/ALAS-2024-639.html","summary":"Amazon Linux Security Advisory ALAS-2024-639 vom 2024-07-02","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4211","summary":"Red Hat Security Advisory RHSA-2024:4211 vom 2024-07-02","category":"external"},{"url":"https://www.dell.com/support/kbdoc/de-de/000226633/dsa-2024-022-security-update-for-dell-networker-vproxy-multiple-component-vulnerabilities","summary":"Dell Security Advisory DSA-2024-022 vom 2024-07-03","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-4211.html","summary":"Oracle Linux Security Advisory ELSA-2024-4211 vom 2024-07-03","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6871-1","summary":"Ubuntu Security Notice USN-6871-1 vom 2024-07-04","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6878-1","summary":"Ubuntu Security Notice USN-6878-1 vom 2024-07-04","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4349","summary":"Red Hat Security Advisory RHSA-2024:4349 vom 2024-07-08","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4352","summary":"Red Hat Security Advisory RHSA-2024:4352 vom 2024-07-08","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-4349.html","summary":"Oracle Linux Security Advisory ELSA-2024-4349 vom 2024-07-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html","summary":"SUSE Security Update SUSE-SU-2024:2337-1 vom 2024-07-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018883.html","summary":"SUSE Security Update SUSE-SU-2024:2326-1 vom 2024-07-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018901.html","summary":"SUSE Security Update SUSE-SU-2024:2372-1 vom 2024-07-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018907.html","summary":"SUSE Security Update SUSE-SU-2024:2360-1 vom 2024-07-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018898.html","summary":"SUSE Security Update SUSE-SU-2024:2358-1 vom 2024-07-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018916.html","summary":"SUSE Security Update SUSE-SU-2024:2381-1 vom 2024-07-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018917.html","summary":"SUSE Security Update SUSE-SU-2024:2382-1 vom 2024-07-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018922.html","summary":"SUSE Security Update SUSE-SU-2024:2394-1 vom 2024-07-10","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6892-1","summary":"Ubuntu Security Notice USN-6892-1 vom 2024-07-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4321","summary":"Red Hat Security Advisory RHSA-2024:4321 vom 2024-07-10","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6893-1","summary":"Ubuntu Security Notice USN-6893-1 vom 2024-07-11","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018943.html","summary":"SUSE Security Update SUSE-SU-2024:2472-1 vom 2024-07-12","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6896-1","summary":"Ubuntu Security Notice USN-6896-1 vom 2024-07-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018947.html","summary":"SUSE Security Update SUSE-SU-2024:2446-1 vom 2024-07-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018946.html","summary":"SUSE Security Update SUSE-SU-2024:2447-1 vom 2024-07-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018948.html","summary":"SUSE Security Update SUSE-SU-2024:2437-1 vom 2024-07-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018945.html","summary":"SUSE Security Update SUSE-SU-2024:2448-1 vom 2024-07-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018944.html","summary":"SUSE Security Update SUSE-SU-2024:2449-1 vom 2024-07-12","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6898-1","summary":"Ubuntu Security Notice USN-6898-1 vom 2024-07-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018970.html","summary":"SUSE Security Update SUSE-SU-2024:2488-1 vom 2024-07-15","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2024:4211","summary":"Rocky Linux Security Advisory RLSA-2024:4211 vom 2024-07-15","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2024:4349","summary":"Rocky Linux Security Advisory RLSA-2024:4349 vom 2024-07-15","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2024:4352","summary":"Rocky Linux Security Advisory RLSA-2024:4352 vom 2024-07-15","category":"external"},{"url":"https://lists.debian.org/debian-security-announce/2024/msg00141.html","summary":"Debian Security Advisory DSA-5730 vom 2024-07-16","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6893-2","summary":"Ubuntu Security Notice USN-6893-2 vom 2024-07-16","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6896-2","summary":"Ubuntu Security Notice USN-6896-2 vom 2024-07-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018985.html","summary":"SUSE Security Update SUSE-SU-2024:2530-1 vom 2024-07-16","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6898-2","summary":"Ubuntu Security Notice USN-6898-2 vom 2024-07-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6896-3","summary":"Ubuntu Security Notice USN-6896-3 vom 2024-07-17","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4631","summary":"Red Hat Security Advisory RHSA-2024:4631 vom 2024-07-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html","summary":"SUSE Security Update SUSE-SU-2024:2561-1 vom 2024-07-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018999.html","summary":"SUSE Security Update SUSE-SU-2024:2558-1 vom 2024-07-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/019000.html","summary":"SUSE Security Update SUSE-SU-2024:2549-1 vom 2024-07-18","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6898-3","summary":"Ubuntu Security Notice USN-6898-3 vom 2024-07-19","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6896-4","summary":"Ubuntu Security Notice USN-6896-4 vom 2024-07-19","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6898-4","summary":"Ubuntu Security Notice USN-6898-4 vom 2024-07-23","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6893-3","summary":"Ubuntu Security Notice USN-6893-3 vom 2024-07-23","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6896-5","summary":"Ubuntu Security Notice USN-6896-5 vom 2024-07-23","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4823","summary":"Red Hat Security Advisory RHSA-2024:4823 vom 2024-07-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4831","summary":"Red Hat Security Advisory RHSA-2024:4831 vom 2024-07-24","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6917-1","summary":"Ubuntu Security Notice USN-6917-1 vom 2024-07-26","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6918-1","summary":"Ubuntu Security Notice USN-6918-1 vom 2024-07-26","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6919-1","summary":"Ubuntu Security Notice USN-6919-1 vom 2024-07-26","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6923-1","summary":"Ubuntu Security Notice USN-6923-1 vom 2024-07-29","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6921-1","summary":"Ubuntu Security Notice USN-6921-1 vom 2024-07-29","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6926-1","summary":"Ubuntu Security Notice USN-6926-1 vom 2024-07-29","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6921-2","summary":"Ubuntu Security Notice USN-6921-2 vom 2024-07-30","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6923-2","summary":"Ubuntu Security Notice USN-6923-2 vom 2024-07-30","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4928","summary":"Red Hat Security Advisory RHSA-2024:4928 vom 2024-07-31","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6927-1","summary":"Ubuntu Security Notice USN-6927-1 vom 2024-07-30","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6938-1","summary":"Ubuntu Security Notice USN-6938-1 vom 2024-07-31","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7162077","summary":"IBM Security Bulletin 7162077 vom 2024-07-31","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2024:4928","summary":"Rocky Linux Security Advisory RLSA-2024:4928 vom 2024-08-01","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-4928.html","summary":"Oracle Linux Security Advisory ELSA-2024-4928 vom 2024-08-01","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6926-2","summary":"Ubuntu Security Notice USN-6926-2 vom 2024-08-01","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019090.html","summary":"SUSE Security Update SUSE-SU-2024:2722-1 vom 2024-08-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019098.html","summary":"SUSE Security Update SUSE-SU-2024:2751-1 vom 2024-08-05","category":"external"},{"url":"https://www.dell.com/support/kbdoc/de-de/000227573/dsa-2024-348-security-update-for-dell-avamar-dell-networker-virtual-edition-nve-and-dell-powerprotect-dp-series-appliance-dell-integrated-data-protection-appliance-idpa-security-update-for-multiple-vulnerabilities","summary":"Dell Security Advisory DSA-2024-348 vom 2024-08-06","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-12571.html","summary":"Oracle Linux Security Advisory ELSA-2024-12571 vom 2024-08-06","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-12570.html","summary":"Oracle Linux Security Advisory ELSA-2024-12570 vom 2024-08-06","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5067","summary":"Red Hat Security Advisory RHSA-2024:5067 vom 2024-08-07","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5065","summary":"Red Hat Security Advisory RHSA-2024:5065 vom 2024-08-07","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5066","summary":"Red Hat Security Advisory RHSA-2024:5066 vom 2024-08-07","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html","summary":"SUSE Security Update SUSE-SU-2024:2802-1 vom 2024-08-07","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5102","summary":"Red Hat Security Advisory RHSA-2024:5102 vom 2024-08-08","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5101","summary":"Red Hat Security Advisory RHSA-2024:5101 vom 2024-08-08","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6950-1","summary":"Ubuntu Security Notice USN-6950-1 vom 2024-08-09","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6952-1","summary":"Ubuntu Security Notice USN-6952-1 vom 2024-08-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019155.html","summary":"SUSE Security Update SUSE-SU-2024:2821-1 vom 2024-08-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019151.html","summary":"SUSE Security Update SUSE-SU-2024:2825-1 vom 2024-08-08","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6951-1","summary":"Ubuntu Security Notice USN-6951-1 vom 2024-08-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019147.html","summary":"SUSE Security Update SUSE-SU-2024:2840-1 vom 2024-08-08","category":"external"},{"url":"https://oss.oracle.com/pipermail/oraclevm-errata/2024-August/001098.html","summary":"ORACLE OVMSA-2024-0010 vom 2024-08-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019146.html","summary":"SUSE Security Update SUSE-SU-2024:2841-1 vom 2024-08-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019144.html","summary":"SUSE Security Update SUSE-SU-2024:2850-1 vom 2024-08-08","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6953-1","summary":"Ubuntu Security Notice USN-6953-1 vom 2024-08-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019143.html","summary":"SUSE Security Update SUSE-SU-2024:2851-1 vom 2024-08-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019152.html","summary":"SUSE Security Update SUSE-SU-2024:2824-1 vom 2024-08-08","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6926-3","summary":"Ubuntu Security Notice USN-6926-3 vom 2024-08-09","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-5101.html","summary":"Oracle Linux Security Advisory ELSA-2024-5101 vom 2024-08-09","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6956-1","summary":"Ubuntu Security Notice USN-6956-1 vom 2024-08-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5257","summary":"Red Hat Security Advisory RHSA-2024:5257 vom 2024-08-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5256","summary":"Red Hat Security Advisory RHSA-2024:5256 vom 2024-08-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5255","summary":"Red Hat Security Advisory RHSA-2024:5255 vom 2024-08-13","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6950-2","summary":"Ubuntu Security Notice USN-6950-2 vom 2024-08-13","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6957-1","summary":"Ubuntu Security Notice USN-6957-1 vom 2024-08-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html","summary":"SUSE Security Update SUSE-SU-2024:2892-1 vom 2024-08-13","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2024-049.html","summary":"Amazon Linux Security Advisory ALASKERNEL-5.15-2024-049 vom 2024-08-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019182.html","summary":"SUSE Security Update SUSE-SU-2024:2894-1 vom 2024-08-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html","summary":"SUSE Security Update SUSE-SU-2024:2896-1 vom 2024-08-13","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-067.html","summary":"Amazon Linux Security Advisory ALASKERNEL-5.10-2024-067 vom 2024-08-13","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2024-079.html","summary":"Amazon Linux Security Advisory ALASKERNEL-5.4-2024-079 vom 2024-08-13","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6950-3","summary":"Ubuntu Security Notice USN-6950-3 vom 2024-08-13","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-068.html","summary":"Amazon Linux Security Advisory ALASKERNEL-5.10-2024-068 vom 2024-08-13","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2024-078.html","summary":"Amazon Linux Security Advisory ALASKERNEL-5.4-2024-078 vom 2024-08-13","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS-2024-2615.html","summary":"Amazon Linux Security Advisory ALAS-2024-2615 vom 2024-08-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5363","summary":"Red Hat Security Advisory RHSA-2024:5363 vom 2024-08-14","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5365","summary":"Red Hat Security Advisory RHSA-2024:5365 vom 2024-08-14","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5364","summary":"Red Hat Security Advisory RHSA-2024:5364 vom 2024-08-14","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6952-2","summary":"Ubuntu Security Notice USN-6952-2 vom 2024-08-13","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6951-2","summary":"Ubuntu Security Notice USN-6951-2 vom 2024-08-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019193.html","summary":"SUSE Security Update SUSE-SU-2024:2902-1 vom 2024-08-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019194.html","summary":"SUSE Security Update SUSE-SU-2024:2901-1 vom 2024-08-14","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-5363.html","summary":"Oracle Linux Security Advisory ELSA-2024-5363 vom 2024-08-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019209.html","summary":"SUSE Security Update SUSE-SU-2024:2929-1 vom 2024-08-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html","summary":"SUSE Security Update SUSE-SU-2024:2939-1 vom 2024-08-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019220.html","summary":"SUSE Security Update SUSE-SU-2024:2947-1 vom 2024-08-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019212.html","summary":"SUSE Security Update SUSE-SU-2024:2940-1 vom 2024-08-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/MFQEXBT2XPZQJMUF7MN6ZVO5FXVY4NKK/","summary":"SUSE Security Update SUSE-SU-2024:1663-1 vom 2024-08-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html","summary":"SUSE Security Update SUSE-SU-2024:1669-1 vom 2024-08-19","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6951-3","summary":"Ubuntu Security Notice USN-6951-3 vom 2024-08-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html","summary":"SUSE Security Update SUSE-SU-2024:2203-1 vom 2024-08-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html","summary":"SUSE Security Update SUSE-SU-2024:2973-1 vom 2024-08-20","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2024-181.html","summary":"Amazon Linux Security Advisory ALASLIVEPATCH-2024-181 vom 2024-08-21","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6950-4","summary":"Ubuntu Security Notice USN-6950-4 vom 2024-08-21","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6951-4","summary":"Ubuntu Security Notice USN-6951-4 vom 2024-08-21","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2024-082.html","summary":"Amazon Linux Security Advisory ALASKERNEL-5.4-2024-082 vom 2024-08-21","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2024:5102","summary":"Rocky Linux Security Advisory RLSA-2024:5102 vom 2024-08-21","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2024:5101","summary":"Rocky Linux Security Advisory RLSA-2024:5101 vom 2024-08-21","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2024-182.html","summary":"Amazon Linux Security Advisory ALASLIVEPATCH-2024-182 vom 2024-08-21","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6973-1","summary":"Ubuntu Security Notice USN-6973-1 vom 2024-08-22","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6976-1","summary":"Ubuntu Security Notice USN-6976-1 vom 2024-08-22","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6979-1","summary":"Ubuntu Security Notice USN-6979-1 vom 2024-08-22","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6973-2","summary":"Ubuntu Security Notice USN-6973-2 vom 2024-08-23","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6973-3","summary":"Ubuntu Security Notice USN-6973-3 vom 2024-08-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019326.html","summary":"SUSE Security Update SUSE-SU-2024:3037-1 vom 2024-08-27","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5928","summary":"Red Hat Security Advisory RHSA-2024:5928 vom 2024-08-28","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-5928.html","summary":"Oracle Linux Security Advisory ELSA-2024-5928 vom 2024-08-29","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6973-4","summary":"Ubuntu Security Notice USN-6973-4 vom 2024-09-02","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:6206","summary":"Red Hat Security Advisory RHSA-2024:6206 vom 2024-09-03","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:6268","summary":"Red Hat Security Advisory RHSA-2024:6268 vom 2024-09-04","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:6267","summary":"Red Hat Security Advisory RHSA-2024:6267 vom 2024-09-04","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:6297","summary":"Red Hat Security Advisory RHSA-2024:6297 vom 2024-09-04","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7167662","summary":"IBM Security Bulletin 7167662 vom 2024-09-05","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019407.html","summary":"SUSE Security Update SUSE-SU-2024:3195-1 vom 2024-09-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html","summary":"SUSE Security Update SUSE-SU-2024:3190-1 vom 2024-09-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:6567","summary":"Red Hat Security Advisory RHSA-2024:6567 vom 2024-09-11","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019400.html","summary":"SUSE Security Update SUSE-SU-2024:3194-1 vom 2024-09-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html","summary":"SUSE Security Update SUSE-SU-2024:3189-1 vom 2024-09-10","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-6567.html","summary":"Oracle Linux Security Advisory ELSA-2024-6567 vom 2024-09-12","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YNWVZVIFSX7PLBJX3I3PDZ4MIBERTN2Y/","summary":"SUSE Security Update SUSE-SU-2024:3209-1 vom 2024-09-11","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7006-1","summary":"Ubuntu Security Notice USN-7006-1 vom 2024-09-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019436.html","summary":"SUSE Security Update SUSE-SU-2024:3252-1 vom 2024-09-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019435.html","summary":"SUSE Security Update SUSE-SU-2024:3251-1 vom 2024-09-16","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2024:6567","summary":"Rocky Linux Security Advisory RLSA-2024:6567 vom 2024-09-17","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:6745","summary":"Red Hat Security Advisory RHSA-2024:6745 vom 2024-09-18","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:6744","summary":"Red Hat Security Advisory RHSA-2024:6744 vom 2024-09-18","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7019-1","summary":"Ubuntu Security Notice USN-7019-1 vom 2024-09-18","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7168815","summary":"IBM Security Bulletin 7168815 vom 2024-09-18","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:6753","summary":"Red Hat Security Advisory RHSA-2024:6753 vom 2024-09-18","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7022-1","summary":"Ubuntu Security Notice USN-7022-1 vom 2024-09-18","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7021-1","summary":"Ubuntu Security Notice USN-7021-1 vom 2024-09-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019461.html","summary":"SUSE Security Update SUSE-SU-2024:3318-1 vom 2024-09-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019478.html","summary":"SUSE Security Update SUSE-SU-2024:3347-1 vom 2024-09-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html","summary":"SUSE Security Update SUSE-SU-2024:3368-1 vom 2024-09-23","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019486.html","summary":"SUSE Security Update SUSE-SU-2024:3375-1 vom 2024-09-23","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019491.html","summary":"SUSE Security Update SUSE-SU-2024:3363-1 vom 2024-09-23","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html","summary":"SUSE Security Update SUSE-SU-2024:3379-1 vom 2024-09-23","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7028-1","summary":"Ubuntu Security Notice USN-7028-1 vom 2024-09-23","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7021-2","summary":"Ubuntu Security Notice USN-7021-2 vom 2024-09-23","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:6993","summary":"Red Hat Security Advisory RHSA-2024:6993 vom 2024-09-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:7003","summary":"Red Hat Security Advisory RHSA-2024:7003 vom 2024-09-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:7002","summary":"Red Hat Security Advisory RHSA-2024:7002 vom 2024-09-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:6997","summary":"Red Hat Security Advisory RHSA-2024:6997 vom 2024-09-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html","summary":"SUSE Security Update SUSE-SU-2024:3383-1 vom 2024-09-23","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html","summary":"SUSE Security Update SUSE-SU-2024:3399-1 vom 2024-09-23","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7169778","summary":"IBM Security Bulletin 7169778 vom 2024-09-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:7000","summary":"Red Hat Security Advisory RHSA-2024:7000 vom 2024-09-24","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-6997.html","summary":"Oracle Linux Security Advisory ELSA-2024-6997 vom 2024-09-26","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-7000.html","summary":"Oracle Linux Security Advisory ELSA-2024-7000 vom 2024-09-26","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7021-3","summary":"Ubuntu Security Notice USN-7021-3 vom 2024-09-26","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/2HO244EHQ65DPDJ2NOBAXLG7QYWSCUMA/","summary":"SUSE Security Update SUSE-SU-2024:3483-1 vom 2024-09-29","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2HO244EHQ65DPDJ2NOBAXLG7QYWSCUMA/","summary":"SUSE Security Update SUSE-SU-2024:3483-1 vom 2024-09-29","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2024:7001","summary":"Rocky Linux Security Advisory RLSA-2024:7001 vom 2024-09-30","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7022-2","summary":"Ubuntu Security Notice USN-7022-2 vom 2024-10-01","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-12700.html","summary":"Oracle Linux Security Advisory ELSA-2024-12700 vom 2024-10-01","category":"external"},{"url":"https://oss.oracle.com/pipermail/oraclevm-errata/2024-October/001101.html","summary":"ORACLE OVMSA-2024-0013 vom 2024-10-03","category":"external"},{"url":"https://lists.debian.org/debian-security-announce/2024/msg00195.html","summary":"Debian Security Advisory DSA-5782 vom 2024-10-03","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7021-4","summary":"Ubuntu Security Notice USN-7021-4 vom 2024-10-03","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html","summary":"SUSE Security Update SUSE-SU-2024:3566-1 vom 2024-10-09","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7022-3","summary":"Ubuntu Security Notice USN-7022-3 vom 2024-10-10","category":"external"},{"url":"https://www.dell.com/support/kbdoc/de-de/000234730/dsa-2024-422-security-update-for-dell-networker-vproxy-multiple-component-vulnerabilities","summary":"Dell Security Advisory DSA-2024-422 vom 2024-10-10","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/TF6OKVTF5VSUGWWYIUXLV2YZK7NYELIN/","summary":"SUSE Security Update SUSE-SU-2024:3623-1 vom 2024-10-15","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VBN5S6CN75ZWGV3ZNRLZRMQ5DF3HMBZE/","summary":"SUSE Security Update SUSE-SU-2024:3631-1 vom 2024-10-15","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7069-1","summary":"Ubuntu Security Notice USN-7069-1 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/MOG44NUGCSJS6Q3AKMCV3X4IK2DN6CLL/","summary":"SUSE Security Update SUSE-SU-2024:3695-1 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/Y2P3R5HQ4Z7AYZLBXUGXBJMITFENT5NV/","summary":"SUSE Security Update SUSE-SU-2024:3694-1 vom 2024-10-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html","summary":"SUSE Security Update SUSE-SU-2024:3662-1 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YYPGEHXE3QJ5NBRD57VSRTM36AC5DISM/","summary":"SUSE Security Update SUSE-SU-2024:3696-1 vom 2024-10-16","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7073-1","summary":"Ubuntu Security Notice USN-7073-1 vom 2024-10-17","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/A6BRGXRVSUAODD2ZZSX5GJCV46W4N5YB/","summary":"SUSE Security Update SUSE-SU-2024:3697-1 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/G3EDKBVPHAPKDJ45CNEJLJ4KGJAHJ4R7/","summary":"SUSE Security Update SUSE-SU-2024:3700-1 vom 2024-10-16","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7073-2","summary":"Ubuntu Security Notice USN-7073-2 vom 2024-10-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7028-2","summary":"Ubuntu Security Notice USN-7028-2 vom 2024-10-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7069-2","summary":"Ubuntu Security Notice USN-7069-2 vom 2024-10-17","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-12793.html","summary":"Oracle Linux Security Advisory ELSA-2024-12793 vom 2024-10-21","category":"external"},{"url":"http://linux.oracle.com/errata/ELSA-2024-12794.html","summary":"Oracle Linux Security Advisory ELSA-2024-12794 vom 2024-10-21","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:8318","summary":"Red Hat Security Advisory RHSA-2024:8318 vom 2024-10-23","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7173960","summary":"IBM Security Bulletin 7173960 vom 2024-10-23","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:8617","summary":"Red Hat Security Advisory RHSA-2024:8617 vom 2024-10-30","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:8614","summary":"Red Hat Security Advisory RHSA-2024:8614 vom 2024-10-30","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:8613","summary":"Red Hat Security Advisory RHSA-2024:8613 vom 2024-10-30","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VHXZ2BQRCVWQY2AVSULS6AN56SITZ273/","summary":"SUSE Security Update SUSE-SU-2024:3837-1 vom 2024-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html","summary":"SUSE Security Update SUSE-SU-2024:3793-1 vom 2024-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html","summary":"SUSE Security Update SUSE-SU-2024:3820-1 vom 2024-10-30","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/JIUM76237NQIAK3CP7ENKHD5EOEBDHZH/","summary":"SUSE Security Update SUSE-SU-2024:3815-1 vom 2024-10-30","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/I22FOLEFZIBTJBTIPHH5GXPKMIXVDSDI/","summary":"SUSE Security Update SUSE-SU-2024:3806-1 vom 2024-10-30","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/RMOWLUMWUZKBWNWZRVPCJY43YUOMCMJ7/","summary":"SUSE Security Update SUSE-SU-2024:3829-1 vom 2024-10-30","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VVJDY73ZQLYG6XTLPXQKV6DOXIBCWQNH/","summary":"SUSE Security Update SUSE-SU-2024:3842-1 vom 2024-10-31","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7021-5","summary":"Ubuntu Security Notice USN-7021-5 vom 2024-10-31","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/CJCHUFTBOJTQRE24NTRP6WMCK5BGPZ3N/","summary":"SUSE Security Update SUSE-SU-2024:3852-1 vom 2024-10-31","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/7YDAYBSAUUUZVVIKYWRRX5O6ZCOQ2K46/","summary":"SUSE Security Update SUSE-SU-2024:3851-1 vom 2024-10-31","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-8617.html","summary":"Oracle Linux Security Advisory ELSA-2024-8617 vom 2024-10-31","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7088-1","summary":"Ubuntu Security Notice USN-7088-1 vom 2024-10-31","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7174634","summary":"IBM Security Bulletin","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:8856","summary":"Red Hat Security Advisory RHSA-2024:8856 vom 2024-11-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:8870","summary":"Red Hat Security Advisory RHSA-2024:8870 vom 2024-11-05","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7088-2","summary":"Ubuntu Security Notice USN-7088-2 vom 2024-11-04","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-8856.html","summary":"Oracle Linux Security Advisory ELSA-2024-8856 vom 2024-11-06","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7088-3","summary":"Ubuntu Security Notice USN-7088-3 vom 2024-11-06","category":"external"},{"url":"https://ubuntu.com/security/notices/LSN-0107-1","summary":"Ubuntu Security Notice LSN-0107-1 vom 2024-11-07","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2024:8617","summary":"Rocky Linux Security Advisory RLSA-2024:8617 vom 2024-11-08","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2024:8870","summary":"Rocky Linux Security Advisory RLSA-2024:8870 vom 2024-11-08","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-12813.html","summary":"Oracle Linux Security Advisory ELSA-2024-12813 vom 2024-11-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:9315","summary":"Red Hat Security Advisory RHSA-2024:9315 vom 2024-11-12","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-12815.html","summary":"Oracle Linux Security Advisory ELSA-2024-12815 vom 2024-11-13","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/CIC23R3UQSPF2K4P2CX54TPCX5T7KWQG/","summary":"SUSE Security Update SUSE-SU-2024:3986-1 vom 2024-11-13","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/KB6DG7QR5KXDQRV57H4IY2TB2LW42K4S/","summary":"SUSE Security Update SUSE-SU-2024:3985-1 vom 2024-11-13","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/L52VEDNTEHWEPR56WZN4KZNMEUYGCJX6/","summary":"SUSE Security Update SUSE-SU-2024:3984-1 vom 2024-11-13","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QUOFKELDJYP3JMHIXPCVKVI4REVXAKTX/","summary":"SUSE Security Update SUSE-SU-2024:3983-1 vom 2024-11-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:9546","summary":"Red Hat Security Advisory RHSA-2024:9546 vom 2024-11-13","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7088-5","summary":"Ubuntu Security Notice USN-7088-5 vom 2024-11-14","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7119-1","summary":"Ubuntu Security Notice USN-7119-1 vom 2024-11-20","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-November/019838.html","summary":"SUSE Security Update SUSE-SU-2024:4038-1 vom 2024-11-19","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7176961","summary":"IBM Security Bulletin 7176961 vom 2024-11-22","category":"external"},{"url":"https://lists.debian.org/debian-security-announce/2024/msg00233.html","summary":"Debian Security Advisory DSA-5818 vom 2024-11-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:10282","summary":"Red Hat Security Advisory RHSA-2024:10282 vom 2024-11-26","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-12842.html","summary":"Oracle Linux Security Advisory ELSA-2024-12842 vom 2024-11-25","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:10262","summary":"Red Hat Security Advisory RHSA-2024:10262 vom 2024-11-26","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:10281","summary":"Red Hat Security Advisory RHSA-2024:10281 vom 2024-11-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html","summary":"SUSE Security Update SUSE-SU-2024:4082-1 vom 2024-11-27","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-10281.html","summary":"Oracle Linux Security Advisory ELSA-2024-10281 vom 2024-11-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html","summary":"SUSE Security Update SUSE-SU-2024:4081-1 vom 2024-11-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html","summary":"SUSE Security Update SUSE-SU-2024:4103-1 vom 2024-11-28","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html","summary":"SUSE Security Update SUSE-SU-2024:4100-1 vom 2024-11-28","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html","summary":"SUSE Security Update SUSE-SU-2024:4123-1 vom 2024-12-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html","summary":"SUSE Security Update SUSE-SU-2024:4140-1 vom 2024-12-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html","summary":"SUSE Security Update SUSE-SU-2024:4131-1 vom 2024-12-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html","summary":"SUSE Security Update SUSE-SU-2024:4122-1 vom 2024-12-02","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:10772","summary":"Red Hat Security Advisory RHSA-2024:10772 vom 2024-12-04","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:10773","summary":"Red Hat Security Advisory RHSA-2024:10773 vom 2024-12-04","category":"external"},{"url":"http://linux.oracle.com/errata/ELSA-2024-12851.html","summary":"Oracle Linux Security Advisory ELSA-2024-12851 vom 2024-12-05","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/P4UZ4KLYIQHACIYR7LE2ANITUCPLWFYS/","summary":"SUSE Security Update SUSE-SU-2024:4214-1 vom 2024-12-05","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/4UVNDL3CU4NHVPE7QELR2N5HRCDSMYEV/","summary":"SUSE Security Update SUSE-SU-2024:4218-1 vom 2024-12-06","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/B6RMLGICBLD3BNXSBS7J23W3GCEJMFJA/","summary":"SUSE Security Update SUSE-SU-2024:4234-1 vom 2024-12-06","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/ODASOBSBN3UUGHNO44MK2K4MC35CPLXJ/","summary":"SUSE Security Update SUSE-SU-2024:4236-1 vom 2024-12-06","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LIMMCWFWYJUMJTABZZ7ZEYXOOVE5BZY7/","summary":"SUSE Security Update SUSE-SU-2024:4235-1 vom 2024-12-06","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html","summary":"SUSE Security Update SUSE-SU-2024:4226-1 vom 2024-12-06","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RRJRAM3LFR4MNOHCFB2XIOS6OJUDNUPE/","summary":"SUSE Security Update SUSE-SU-2024:4266-1 vom 2024-12-09","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:10942","summary":"Red Hat Security Advisory RHSA-2024:10942 vom 2024-12-11","category":"external"},{"url":"https://oss.oracle.com/pipermail/oraclevm-errata/2024-December/001104.html","summary":"ORACLE OVMSA-2024-0016 vom 2024-12-10","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7159-1","summary":"Ubuntu Security Notice USN-7159-1 vom 2024-12-12","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7156-1","summary":"Ubuntu Security Notice USN-7156-1 vom 2024-12-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html","summary":"SUSE Security Update SUSE-SU-2024:4318-1 vom 2024-12-13","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/SARXL66CQHD5VSFG5PUBNBVBPVFUN4KT/","summary":"SUSE Security Update SUSE-SU-2024:4314-1 vom 2024-12-13","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/S4I5Z6ALCJLHTP25U3HMJHEXN4DR2USM/","summary":"SUSE Security Update SUSE-SU-2024:4316-1 vom 2024-12-13","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LQPWDP54GSTHYCV4CTCOE67D2ANVPPUW/","summary":"SUSE Security Update SUSE-SU-2024:4315-1 vom 2024-12-13","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-12884.html","summary":"Oracle Linux Security Advisory ELSA-2024-12884 vom 2024-12-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7159-3","summary":"Ubuntu Security Notice USN-7159-2 vom 2024-12-18","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7166-2","summary":"Ubuntu Security Notice USN-7159-2 vom 2024-12-18","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7159-2","summary":"Ubuntu Security Notice USN-7159-2 vom 2024-12-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html","summary":"SUSE Security Update SUSE-SU-2024:4367-1 vom 2024-12-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html","summary":"SUSE Security Update SUSE-SU-2024:4364-1 vom 2024-12-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7166-1","summary":"Ubuntu Security Notice USN-7166-1 vom 2024-12-17","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-12887.html","summary":"Oracle Linux Security Advisory ELSA-2024-12887 vom 2024-12-18","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/WFOJHFFEHK42VPQ6XLZWB77H5OEJ3FF4/","summary":"SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html","summary":"SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WFOJHFFEHK42VPQ6XLZWB77H5OEJ3FF4/","summary":"SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2024:10282","summary":"Rocky Linux Security Advisory RLSA-2024:10282 vom 2024-12-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html","summary":"SUSE Security Update SUSE-SU-2024:4387-1 vom 2024-12-19","category":"external"},{"url":"https://ubuntu.com/security/notices/LSN-0108-1","summary":"Ubuntu Security Notice LSN-0108-1 vom 2024-12-19","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-075.html","summary":"Amazon Linux Security Advisory ALASKERNEL-5.10-2024-075 vom 2024-12-19","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2024-057.html","summary":"Amazon Linux Security Advisory ALASKERNEL-5.15-2024-057 vom 2024-12-19","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7159-4","summary":"Ubuntu Security Notice USN-7159-4 vom 2024-12-20","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7166-3","summary":"Ubuntu Security Notice USN-7166-3 vom 2024-12-20","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html","summary":"Debian Security Advisory DLA-4008 vom 2025-01-03","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7186-1","summary":"Ubuntu Security Notice USN-7186-1 vom 2025-01-06","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7159-5","summary":"Ubuntu Security Notice USN-7159-5 vom 2025-01-06","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7180361","summary":"IBM Security Bulletin 7180361 vom 2025-01-07","category":"external"},{"url":"https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-24-1R2-release","summary":"Juniper Security Advisory JSA92874 vom 2024-01-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html","summary":"SUSE Security Update SUSE-SU-2025:0035-1 vom 2025-01-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html","summary":"SUSE Security Update SUSE-SU-2025:0034-1 vom 2025-01-08","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7195-1","summary":"Ubuntu Security Notice USN-7195-1 vom 2025-01-09","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7186-2","summary":"Ubuntu Security Notice USN-7186-2 vom 2025-01-09","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7194-1","summary":"Ubuntu Security Notice USN-7194-1 vom 2025-01-09","category":"external"},{"url":"https://oss.oracle.com/pipermail/el-errata/2025-January/017000.html","summary":"Oracle Linux Security Advisory ELSA-2024-9315 vom 2025-01-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html","summary":"SUSE Security Update SUSE-SU-2025:0107-1 vom 2025-01-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html","summary":"SUSE Security Update SUSE-SU-2025:0109-1 vom 2025-01-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html","summary":"SUSE Security Update SUSE-SU-2025:0103-1 vom 2025-01-14","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7195-2","summary":"Ubuntu Security Notice USN-7195-2 vom 2025-01-14","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VK2D63Q2FKHJWXOLVAS7HPIWURVL3MQQ/","summary":"SUSE Security Update SUSE-SU-2025:0115-1 vom 2025-01-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html","summary":"SUSE Security Update SUSE-SU-2025:0124-1 vom 2025-01-15","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/USHZQFRYGMLVCVQRQLPH4FARDBDAEC6G/","summary":"SUSE Security Update SUSE-SU-2025:0150-1 vom 2025-01-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html","summary":"SUSE Security Update SUSE-SU-2025:0158-1 vom 2025-01-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html","summary":"SUSE Security Update SUSE-SU-2025:0236-1 vom 2025-01-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html","summary":"SUSE Security Update SUSE-SU-2025:0266-1 vom 2025-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html","summary":"SUSE Security Update SUSE-SU-2025:0251-1 vom 2025-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html","summary":"SUSE Security Update SUSE-SU-2025:0264-1 vom 2025-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020208.html","summary":"SUSE Security Update SUSE-SU-2025:0263-1 vom 2025-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html","summary":"SUSE Security Update SUSE-SU-2025:0252-1 vom 2025-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html","summary":"SUSE Security Update SUSE-SU-2025:0261-1 vom 2025-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html","summary":"SUSE Security Update SUSE-SU-2025:0248-1 vom 2025-01-27","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7233-1","summary":"Ubuntu Security Notice USN-7233-1 vom 2025-01-28","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7233-2","summary":"Ubuntu Security Notice USN-7233-2 vom 2025-01-30","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7182335","summary":"IBM Security Bulletin 7182335 vom 2025-02-03","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7233-3","summary":"Ubuntu Security Notice USN-7233-3 vom 2025-02-03","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:1067","summary":"Red Hat Security Advisory RHSA-2025:1067 vom 2025-02-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:1068","summary":"Red Hat Security Advisory RHSA-2025:1068 vom 2025-02-05","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-1068.html","summary":"Oracle Linux Security Advisory ELSA-2025-1068 vom 2025-02-07","category":"external"},{"url":"https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25398","summary":"Brocade Security Advisory BSA-2025-2895 vom 2025-02-13","category":"external"},{"url":"https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25416","summary":"Brocade Security Advisory BSA-2025-2889 vom 2025-02-13","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2025:1067","summary":"Rocky Linux Security Advisory RLSA-2025:1067 vom 2025-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-February/020352.html","summary":"SUSE Security Update SUSE-SU-2025:0556-1 vom 2025-02-14","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:1658","summary":"Red Hat Security Advisory RHSA-2025:1658 vom 2025-02-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-February/020370.html","summary":"SUSE Security Update SUSE-SU-2025:0577-1 vom 2025-02-18","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7184085","summary":"IBM Security Bulletin 7184085 vom 2025-02-25","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html","summary":"Debian Security Advisory DLA-4075 vom 2025-03-01","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:1912","summary":"Red Hat Security Advisory RHSA-2025:1912 vom 2025-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:2270","summary":"Red Hat Security Advisory RHSA-2025:2270 vom 2025-03-05","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7185244","summary":"IBM Security Bulletin 7185244 vom 2025-03-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-March/020500.html","summary":"SUSE Security Update SUSE-SU-2025:0577-2 vom 2025-03-11","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-March/020497.html","summary":"SUSE Security Update SUSE-SU-2025:0834-1 vom 2025-03-11","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:2705","summary":"Red Hat Security Advisory RHSA-2025:2705 vom 2025-03-18","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:3021","summary":"Red Hat Security Advisory RHSA-2025:3021 vom 2025-03-19","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-097.html","summary":"Amazon Linux Security Advisory ALASKERNEL-5.4-2025-097 vom 2025-04-01","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-069.html","summary":"Amazon Linux Security Advisory ALASKERNEL-5.15-2025-069 vom 2025-04-01","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:3510","summary":"Red Hat Security Advisory RHSA-2025:3510 vom 2025-04-02","category":"external"},{"url":"https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-24-1R2-release?language=en_US","summary":"Juniper Security Bulletin","category":"external"},{"url":"https://lists.debian.org/debian-security-announce/2025/msg00062.html","summary":"Debian Security Advisory DSA-5900 vom 2025-04-12","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:3935","summary":"Red Hat Security Advisory RHSA-2025:3935 vom 2025-04-16","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-088.html","summary":"Amazon Linux Security Advisory ALASKERNEL-5.10-2025-088 vom 2025-04-16","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:4509","summary":"Red Hat Security Advisory RHSA-2025:4509 vom 2025-05-06","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7232618","summary":"IBM Security Bulletin 7232618 vom 2025-05-06","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7496-1","summary":"Ubuntu Security Notice USN-7496-1 vom 2025-05-07","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7496-2","summary":"Ubuntu Security Notice USN-7496-2 vom 2025-05-07","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7496-4","summary":"Ubuntu Security Notice USN-7496-4 vom 2025-05-07","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7496-3","summary":"Ubuntu Security Notice USN-7496-3 vom 2025-05-07","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7496-5","summary":"Ubuntu Security Notice USN-7496-5 vom 2025-05-07","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7506-2","summary":"Ubuntu Security Notice USN-7506-2 vom 2025-05-12","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7506-1","summary":"Ubuntu Security Notice USN-7506-1 vom 2025-05-12","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7506-3","summary":"Ubuntu Security Notice USN-7506-3 vom 2025-05-12","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-20320.html","summary":"Oracle Linux Security Advisory ELSA-2025-20320 vom 2025-05-12","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7506-4","summary":"Ubuntu Security Notice USN-7506-4 vom 2025-05-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:6966","summary":"Red Hat Security Advisory RHSA-2025:6966 vom 2025-05-13","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7233232","summary":"IBM Security Bulletin 7233232 vom 2025-05-13","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7516-1","summary":"Ubuntu Security Notice USN-7516-1 vom 2025-05-16","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7510-1","summary":"Ubuntu Security Notice USN-7510-1 vom 2025-05-16","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7510-2","summary":"Ubuntu Security Notice USN-7510-2 vom 2025-05-16","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7512-1","summary":"Ubuntu Security Notice USN-7512-1 vom 2025-05-16","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7511-1","summary":"Ubuntu Security Notice USN-7511-1 vom 2025-05-16","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7511-2","summary":"Ubuntu Security Notice USN-7516-2 vom 2025-05-16","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7517-1","summary":"Ubuntu Security Notice USN-7517-1 vom 2025-05-16","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7518-1","summary":"Ubuntu Security Notice USN-7518-1 vom 2025-05-20","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7516-3","summary":"Ubuntu Security Notice USN-7516-3 vom 2025-05-20","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7510-4","summary":"Ubuntu Security Notice USN-7510-4 vom 2025-05-20","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7510-3","summary":"Ubuntu Security Notice USN-7510-3 vom 2025-05-20","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7510-5","summary":"Ubuntu Security Notice USN-7510-5 vom 2025-05-20","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7511-3","summary":"Ubuntu Security Notice USN-7511-3 vom 2025-05-20","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7516-4","summary":"Ubuntu Security Notice USN-7516-4 vom 2025-05-21","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-May/020870.html","summary":"SUSE Security Update SUSE-SU-2025:01614-1 vom 2025-05-21","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7517-2","summary":"Ubuntu Security Notice USN-7517-2 vom 2025-05-21","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7516-5","summary":"Ubuntu Security Notice USN-7516-5 vom 2025-05-23","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7516-6","summary":"Ubuntu Security Notice USN-7516-6 vom 2025-05-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-May/020902.html","summary":"SUSE Security Update SUSE-SU-2025:01707-1 vom 2025-05-26","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7517-3","summary":"Ubuntu Security Notice USN-7517-3 vom 2025-05-26","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html","summary":"Debian Security Advisory DLA-4178 vom 2025-05-26","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:8248","summary":"Red Hat Security Advisory RHSA-2025:8248 vom 2025-05-28","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7510-6","summary":"Ubuntu Security Notice USN-7510-6 vom 2025-05-27","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7540-1","summary":"Ubuntu Security Notice USN-7540-1 vom 2025-05-28","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7510-7","summary":"Ubuntu Security Notice USN-7510-7 vom 2025-05-28","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7539-1","summary":"Ubuntu Security Notice USN-7539-1 vom 2025-05-28","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7516-7","summary":"Ubuntu Security Notice USN-7516-7 vom 2025-05-29","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-May/020965.html","summary":"SUSE Security Update SUSE-SU-2025:20343-1 vom 2025-05-29","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html","summary":"Debian Security Advisory DLA-4193 vom 2025-05-30","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7510-8","summary":"Ubuntu Security Notice USN-7510-8 vom 2025-05-29","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7516-8","summary":"Ubuntu Security Notice USN-7516-8 vom 2025-05-29","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-May/020964.html","summary":"SUSE Security Update SUSE-SU-2025:20344-1 vom 2025-05-29","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7516-9","summary":"Ubuntu Security Notice USN-7516-9 vom 2025-05-29","category":"external"},{"url":"https://www.dell.com/support/kbdoc/de-de/000326299/dsa-2025-213-security-update-for-dell-avamar-dell-networker-virtual-edition-nve-and-dell-powerprotect-dp-series-appliance-dell-integrated-data-protection-appliance-idpa-multiple-third-party-vulnerabilities","summary":"Dell Security Advisory DSA-2025-213 vom 2025-05-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021016.html","summary":"SUSE Security Update SUSE-SU-2025:20354-1 vom 2025-06-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021015.html","summary":"SUSE Security Update SUSE-SU-2025:20355-1 vom 2025-06-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html","summary":"SUSE Security Update SUSE-SU-2025:20247-1 vom 2025-06-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html","summary":"SUSE Security Update SUSE-SU-2025:20249-1 vom 2025-06-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html","summary":"SUSE Security Update SUSE-SU-2025:20246-1 vom 2025-06-04","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7554-2","summary":"Ubuntu Security Notice USN-7554-2 vom 2025-06-04","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7554-3","summary":"Ubuntu Security Notice USN-7554-3 vom 2025-06-04","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7553-2","summary":"Ubuntu Security Notice USN-7553-2 vom 2025-06-04","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7554-1","summary":"Ubuntu Security Notice USN-7554-1 vom 2025-06-04","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7553-1","summary":"Ubuntu Security Notice USN-7553-1 vom 2025-06-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html","summary":"SUSE Security Update SUSE-SU-2025:20164-1 vom 2025-06-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html","summary":"SUSE Security Update SUSE-SU-2025:20166-1 vom 2025-06-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html","summary":"SUSE Security Update SUSE-SU-2025:20163-1 vom 2025-06-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021403.html","summary":"SUSE Security Update SUSE-SU-2025:20008-1 vom 2025-06-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html","summary":"SUSE Security Update SUSE-SU-2025:20028-1 vom 2025-06-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html","summary":"SUSE Security Update SUSE-SU-2025:20047-1 vom 2025-06-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html","summary":"SUSE Security Update SUSE-SU-2025:20044-1 vom 2025-06-04","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7553-3","summary":"Ubuntu Security Notice USN-7553-3 vom 2025-06-06","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7553-6","summary":"Ubuntu Security Notice USN-7553-6 vom 2025-06-09","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7553-4","summary":"Ubuntu Security Notice USN-7553-4 vom 2025-06-09","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7553-5","summary":"Ubuntu Security Notice USN-7553-5 vom 2025-06-09","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:8796","summary":"Red Hat Security Advisory RHSA-2025:8796 vom 2025-06-11","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html","summary":"SUSE Security Update SUSE-SU-2025:01919-1 vom 2025-06-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021509.html","summary":"SUSE Security Update SUSE-SU-2025:01951-1 vom 2025-06-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html","summary":"SUSE Security Update SUSE-SU-2025:01964-1 vom 2025-06-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html","summary":"SUSE Security Update SUSE-SU-2025:01967-1 vom 2025-06-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021537.html","summary":"SUSE Security Update SUSE-SU-2025:01972-1 vom 2025-06-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021538.html","summary":"SUSE Security Update SUSE-SU-2025:01983-1 vom 2025-06-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7593-1","summary":"Ubuntu Security Notice USN-7593-1 vom 2025-06-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:9584","summary":"Red Hat Security Advisory RHSA-2025:9584 vom 2025-06-25","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7602-1","summary":"Ubuntu Security Notice USN-7602-1 vom 2025-06-26","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7236419","summary":"IBM Security Bulletin 7236419 vom 2025-06-30","category":"external"},{"url":"https://documentation.solarwinds.com/en/success_center/sem/content/release_notes/sem_2025-2-1_release_notes.htm","summary":"SEM 2025.2.1 release notes vom 2025-07-02","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-20406.html","summary":"Oracle Linux Security Advisory ELSA-2025-20406 vom 2025-07-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-July/021785.html","summary":"SUSE Security Update SUSE-SU-2025:02264-1 vom 2025-07-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-July/021811.html","summary":"SUSE Security Update SUSE-SU-2025:02321-1 vom 2025-07-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-July/021810.html","summary":"SUSE Security Update SUSE-SU-2025:02322-1 vom 2025-07-15","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-20470.html","summary":"Oracle Linux Security Advisory ELSA-2025-20470 vom 2025-07-16","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7640-1","summary":"Ubuntu Security Notice USN-7640-1 vom 2025-07-16","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:11810","summary":"Red Hat Security Advisory RHSA-2025:11810 vom 2025-07-28","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-July/021978.html","summary":"SUSE Security Update SUSE-SU-2025:02537-1 vom 2025-07-28","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:13135","summary":"Red Hat Security Advisory RHSA-2025:13135 vom 2025-08-06","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022192.html","summary":"SUSE Security Update SUSE-SU-2025:02846-1 vom 2025-08-18","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7727-2","summary":"Ubuntu Security Notice USN-7727-2 vom 2025-08-29","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7727-1","summary":"Ubuntu Security Notice USN-7727-1 vom 2025-08-29","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:15016","summary":"Red Hat Security Advisory RHSA-2025:15016 vom 2025-09-02","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7727-3","summary":"Ubuntu Security Notice USN-7727-3 vom 2025-09-02","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-20553.html","summary":"Oracle Linux Security Advisory ELSA-2025-20553 vom 2025-09-10","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7755-2","summary":"Ubuntu Security Notice USN-7755-2 vom 2025-09-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7755-1","summary":"Ubuntu Security Notice USN-7755-1 vom 2025-09-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7755-3","summary":"Ubuntu Security Notice USN-7755-3 vom 2025-09-24","category":"external"},{"url":"https://www.dell.com/support/kbdoc/000376224","summary":"Dell Security Update vom 2025-10-02","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7797-1","summary":"Ubuntu Security Notice USN-7797-1 vom 2025-10-02","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7797-2","summary":"Ubuntu Security Notice USN-7797-2 vom 2025-10-02","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7246320","summary":"IBM Security Bulletin 7246320 vom 2025-10-06","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7246319","summary":"IBM Security Bulletin 7246319 vom 2025-10-06","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-20663.html","summary":"Oracle Linux Security Advisory ELSA-2025-20663 vom 2025-10-13","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7853-2","summary":"Ubuntu Security Notice USN-7853-2 vom 2025-10-30","category":"external"},{"url":"https://www.dell.com/support/kbdoc/000385435","summary":"Dell Security Advisory DSA-2025-404 vom 2025-10-31","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7853-1","summary":"Ubuntu Security Notice USN-7853-1 vom 2025-10-30","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7853-3","summary":"Ubuntu Security Notice USN-7853-3 vom 2025-11-07","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7865-1","summary":"Ubuntu Security Notice USN-7865-1 vom 2025-11-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html","summary":"SUSE Security Update SUSE-SU-2025:2264-1 vom 2025-11-11","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7875-1","summary":"Ubuntu Security Notice USN-7875-1 vom 2025-11-19","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-28049.html","summary":"Oracle Linux Security Advisory ELSA-2025-28049 vom 2025-12-15","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7937-1","summary":"Ubuntu Security Notice USN-7937-1 vom 2025-12-16","category":"external"},{"url":"https://www.dell.com/support/kbdoc/000359915","summary":"Dell Security Advisory DSA-2025-318 vom 2026-01-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html","summary":"SUSE Security Update SUSE-SU-2026:0149-1 vom 2026-01-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html","summary":"SUSE Security Update SUSE-SU-2026:0278-1 vom 2026-01-23","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-January/023914.html","summary":"SUSE Security Update SUSE-SU-2026:0281-1 vom 2026-01-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html","summary":"SUSE Security Update SUSE-SU-2026:0293-1 vom 2026-01-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-January/023971.html","summary":"SUSE Security Update SUSE-SU-2026:0315-1 vom 2026-01-29","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7988-1","summary":"Ubuntu Security Notice USN-7988-1 vom 2026-01-30","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7988-2","summary":"Ubuntu Security Notice USN-7988-2 vom 2026-01-30","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7988-3","summary":"Ubuntu Security Notice USN-7988-3 vom 2026-02-05","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7988-4","summary":"Ubuntu Security Notice USN-7988-4 vom 2026-02-11","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html","summary":"SUSE Security Update SUSE-SU-2026:0447-1 vom 2026-02-11","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html","summary":"SUSE Security Update SUSE-SU-2026:0472-1 vom 2026-02-12","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7988-5","summary":"Ubuntu Security Notice USN-7988-5 vom 2026-02-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html","summary":"SUSE Security Update SUSE-SU-2026:0473-1 vom 2026-02-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024176.html","summary":"SUSE Security Update SUSE-SU-2026:20319-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html","summary":"SUSE Security Update SUSE-SU-2026:20283-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html","summary":"SUSE Security Update SUSE-SU-2026:20324-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html","summary":"SUSE Security Update SUSE-SU-2026:20291-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024168.html","summary":"SUSE Security Update SUSE-SU-2026:20327-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html","summary":"SUSE Security Update SUSE-SU-2026:20323-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024190.html","summary":"SUSE Security Update SUSE-SU-2026:20300-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html","summary":"SUSE Security Update SUSE-SU-2026:20320-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html","summary":"SUSE Security Update SUSE-SU-2026:0587-1 vom 2026-02-20","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html","summary":"SUSE Security Update SUSE-SU-2026:20477-1 vom 2026-02-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html","summary":"SUSE Security Update SUSE-SU-2026:20479-1 vom 2026-02-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html","summary":"SUSE Security Update SUSE-SU-2026:20498-1 vom 2026-02-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html","summary":"SUSE Security Update SUSE-SU-2026:20520-1 vom 2026-02-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html","summary":"SUSE Security Update SUSE-SU-2026:20819-1 vom 2026-03-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html","summary":"SUSE Security Update SUSE-SU-2026:20772-1 vom 2026-03-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html","summary":"SUSE Security Update SUSE-SU-2026:20794-1 vom 2026-03-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html","summary":"SUSE Security Update SUSE-SU-2026:20845-1 vom 2026-03-28","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html","summary":"SUSE Security Update SUSE-SU-2026:20872-1 vom 2026-03-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html","summary":"SUSE Security Update SUSE-SU-2026:20876-1 vom 2026-03-30","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6572","summary":"Red Hat Security Advisory RHSA-2026:6572 vom 2026-04-06","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6571","summary":"Red Hat Security Advisory RHSA-2026:6571 vom 2026-04-06","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-6571.html","summary":"Oracle Linux Security Advisory ELSA-2026-6571 vom 2026-04-08","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://access.redhat.com/errata/RHSA-2024:2627","published":"2024-05-01","updated":"2026-04-08","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-09T09:00:51.479Z","sourceUrl":"https://access.redhat.com/errata/RHSA-2024:2627","added":"2026-04-08T00:00:00.000Z","public_url":"https://access.redhat.com/errata/RHSA-2024:2627","public_source":"Red Hat","public_source_slug":"red-hat","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-w-2024-1008 cve-2022-48669 linux kernel: mehrere schwachstellen ermöglichen denial of service red hat bsi","public_published":"2024-05-01","public_updated":"2026-04-08","public_display_date":"2026-04-08","public_sort_date":"2026-04-08","public_period_date":"2026-04-08"},{"id":"BSI:WID-SEC-W-2024-1863","cve":"CVE-2024-39792","title":"NGINX und NGINX Plus: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2024-08-14","published":"2024-08-14","updated":"2026-04-08","source_published":"2024-08-14","source_updated":"2026-04-08","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://my.f5.com/manage/s/article/K000140529","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1863.json","summary":"WID-SEC-W-2024-1863 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1863","summary":"WID-SEC-2024-1863 - Portal Version","category":"self"},{"url":"https://my.f5.com/manage/s/article/K000140529","summary":"F5 Security Advisory vom 2024-08-14","category":"external"},{"url":"https://my.f5.com/manage/s/article/K000140108","summary":"F5 Security Advisory vom 2024-08-14","category":"external"},{"url":"https://github.com/advisories/GHSA-3r23-64c4-mj87","summary":"GitHub Advisory Database vom 2024-08-14","category":"external"},{"url":"https://nginx.org/download/patch.2024.mp4.txt","summary":"NGINX Patch vom 2024-08-14","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-2024-8ba5080dfa","summary":"Fedora Security Advisory FEDORA-2024-8BA5080DFA vom 2024-08-17","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-2024-6ba57fd2a3","summary":"Fedora Security Advisory FEDORA-2024-6BA57FD2A3 vom 2024-08-17","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASNGINX1-2024-007.html","summary":"Amazon Linux Security Advisory ALASNGINX1-2024-007 vom 2024-09-04","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7014-1","summary":"Ubuntu Security Notice USN-7014-1 vom 2024-09-16","category":"external"},{"url":"https://security.gentoo.org/glsa/202409-32","summary":"Gentoo Linux Security Advisory GLSA-202409-32 vom 2024-09-28","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7014-2","summary":"Ubuntu Security Notice USN-7014-2 vom 2024-10-08","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7014-3","summary":"Ubuntu Security Notice USN-7014-3 vom 2024-10-14","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/BYRIPEOK5ECBNF7W6KJS2FEMTDCXGKVL/","summary":"SUSE Security Update SUSE-SU-2025:0283-1 vom 2025-01-29","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/H4OZAFM4N3J4DTIBTIK7KMLG2KJOCA2T/","summary":"SUSE Security Update SUSE-SU-2025:0282-1 vom 2025-01-29","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00017.html","summary":"Debian Security Advisory DLA-4091 vom 2025-03-25","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:3261","summary":"Red Hat Security Advisory RHSA-2025:3261 vom 2025-03-26","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:3262","summary":"Red Hat Security Advisory RHSA-2025:3262 vom 2025-03-26","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-3261.html","summary":"Oracle Linux Security Advisory ELSA-2025-3261 vom 2025-03-28","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-3262.html","summary":"Oracle Linux Security Advisory ELSA-2025-3262 vom 2025-03-28","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:7402","summary":"Red Hat Security Advisory RHSA-2025:7402 vom 2025-05-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:7546","summary":"Red Hat Security Advisory RHSA-2025:7546 vom 2025-05-14","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:7549","summary":"Red Hat Security Advisory RHSA-2025:7549 vom 2025-05-14","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:7542","summary":"Red Hat Security Advisory RHSA-2025:7542 vom 2025-05-14","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:7548","summary":"Red Hat Security Advisory RHSA-2025:7548 vom 2025-05-14","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:7619","summary":"Red Hat Security Advisory RHSA-2025:7619 vom 2025-05-14","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-7402.html","summary":"Oracle Linux Security Advisory ELSA-2025-7402 vom 2025-05-23","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2025:3262","summary":"Rocky Linux Security Advisory RLSA-2025:3262 vom 2025-07-29","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2025:3261","summary":"Rocky Linux Security Advisory RLSA-2025:3261 vom 2025-07-29","category":"external"},{"url":"https://www.dell.com/support/kbdoc/000376224","summary":"Dell Security Update vom 2025-10-02","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-3638.html","summary":"Oracle Linux Security Advisory ELSA-2026-3638 vom 2026-03-04","category":"external"},{"url":"http://linux.oracle.com/errata/ELSA-2026-5599.html","summary":"Oracle Linux Security Advisory ELSA-2026-5599 vom 2026-03-26","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-6923.html","summary":"Oracle Linux Security Advisory ELSA-2026-6923 vom 2026-04-08","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://my.f5.com/manage/s/article/K000140529","published":"2024-08-14","updated":"2026-04-08","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-09T09:00:51.479Z","sourceUrl":"https://my.f5.com/manage/s/article/K000140529","added":"2026-04-08T00:00:00.000Z","public_url":"https://my.f5.com/manage/s/article/K000140529","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-w-2024-1863 cve-2024-39792 nginx und nginx plus: mehrere schwachstellen ermöglichen denial of service bsi bsi","public_published":"2024-08-14","public_updated":"2026-04-08","public_display_date":"2026-04-08","public_sort_date":"2026-04-08","public_period_date":"2026-04-08"},{"id":"BSI:WID-SEC-W-2025-1452","cve":"CVE-2025-38091","title":"Linux Kernel: Mehrere Schwachstellen","date":"2025-07-02","published":"2025-07-02","updated":"2026-04-08","source_published":"2025-07-02","source_updated":"2026-04-08","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://lore.kernel.org/linux-cve-announce/","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1452.json","summary":"WID-SEC-W-2025-1452 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1452","summary":"WID-SEC-2025-1452 - Portal Version","category":"self"},{"url":"https://lore.kernel.org/linux-cve-announce/","summary":"Kernel CVE Announce Mailingliste","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070235-CVE-2025-38091-cb97@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38091","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070237-CVE-2025-38092-70a8@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38092","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070237-CVE-2025-38093-a615@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38093","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070324-CVE-2025-38094-1b5c@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38094","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070340-CVE-2025-38095-6596@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38095","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070303-CVE-2025-38096-ae58@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38096","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070305-CVE-2025-38097-287c@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38097","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070305-CVE-2025-38098-2802@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38098","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070306-CVE-2025-38099-dffb@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38099","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070319-CVE-2025-38100-5040@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38100","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070321-CVE-2025-38101-56c1@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38101","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070321-CVE-2025-38102-d592@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38102","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070322-CVE-2025-38103-dd1b@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38103","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070322-CVE-2025-38105-dfcf@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38105","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070322-CVE-2025-38106-8de3@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38106","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070323-CVE-2025-38107-9344@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38107","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070323-CVE-2025-38108-9c8c@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38108","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070323-CVE-2025-38109-f925@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38109","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070324-CVE-2025-38110-a9c0@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38110","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070324-CVE-2025-38111-8e9a@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38111","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070324-CVE-2025-38112-57a2@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38112","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070325-CVE-2025-38113-d080@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38113","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070325-CVE-2025-38114-c603@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38114","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070325-CVE-2025-38115-cce2@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38115","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070325-CVE-2025-38116-1d80@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38116","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070326-CVE-2025-38117-3424@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38117","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070326-CVE-2025-38118-f9ca@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38118","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070326-CVE-2025-38119-9bbe@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38119","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070327-CVE-2025-38120-4498@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38120","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070327-CVE-2025-38121-5390@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38121","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070327-CVE-2025-38122-cd8d@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38122","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070328-CVE-2025-38123-3e20@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38123","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070328-CVE-2025-38124-bc19@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38124","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070328-CVE-2025-38125-8a6b@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38125","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070329-CVE-2025-38126-3c9b@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38126","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070329-CVE-2025-38127-686d@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38127","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070329-CVE-2025-38128-5b44@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38128","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070330-CVE-2025-38129-3c0e@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38129","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070330-CVE-2025-38130-3371@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38130","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070330-CVE-2025-38131-2350@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38131","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070331-CVE-2025-38132-bfc9@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38132","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070331-CVE-2025-38133-5976@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38133","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070331-CVE-2025-38134-cbff@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38134","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070331-CVE-2025-38135-20aa@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38135","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070332-CVE-2025-38136-1489@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38136","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070332-CVE-2025-38137-d4bf@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38137","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070332-CVE-2025-38138-e28b@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38138","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070333-CVE-2025-38139-5152@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38139","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070333-CVE-2025-38140-0ba9@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38140","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070333-CVE-2025-38141-560e@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38141","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070334-CVE-2025-38142-a038@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38142","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070334-CVE-2025-38143-09c4@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38143","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070334-CVE-2025-38144-036b@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38144","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070335-CVE-2025-38145-548b@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38145","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070335-CVE-2025-38146-4390@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38146","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070335-CVE-2025-38147-52a6@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38147","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070336-CVE-2025-38148-76a4@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38148","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070336-CVE-2025-38149-0dad@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38149","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070336-CVE-2025-38150-3ce8@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38150","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070336-CVE-2025-38151-6483@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38151","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070337-CVE-2025-38153-5735@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38153","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070337-CVE-2025-38154-8353@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38154","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070337-CVE-2025-38155-9967@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38155","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070338-CVE-2025-38156-d23e@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38156","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070338-CVE-2025-38157-bc8c@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38157","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070338-CVE-2025-38158-d5f0@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38158","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070339-CVE-2025-38159-0c95@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38159","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070339-CVE-2025-38160-04ed@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38160","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070339-CVE-2025-38161-0949@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38161","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070340-CVE-2025-38162-cd74@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38162","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070340-CVE-2025-38163-273b@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38163","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070340-CVE-2025-38164-2a23@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38164","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070341-CVE-2025-38165-0d70@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38165","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070341-CVE-2025-38166-3dc8@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38166","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070341-CVE-2025-38167-535f@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38167","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070341-CVE-2025-38168-da4f@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38168","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070342-CVE-2025-38169-11b6@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38169","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070342-CVE-2025-38170-0f47@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38170","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070342-CVE-2025-38171-a380@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38171","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070343-CVE-2025-38172-13be@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38172","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070343-CVE-2025-38173-f02e@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38173","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:11245","summary":"Red Hat Security Advisory RHSA-2025:11245 vom 2025-07-16","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7654-1","summary":"Ubuntu Security Notice USN-7654-1 vom 2025-07-18","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7654-2","summary":"Ubuntu Security Notice USN-7654-2 vom 2025-07-18","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7654-3","summary":"Ubuntu Security Notice USN-7654-3 vom 2025-07-18","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7655-1","summary":"Ubuntu Security Notice USN-7655-1 vom 2025-07-18","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7654-4","summary":"Ubuntu Security Notice USN-7654-4 vom 2025-07-22","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:11861","summary":"Red Hat Security Advisory RHSA-2025:11861 vom 2025-07-28","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:11855","summary":"Red Hat Security Advisory RHSA-2025:11855 vom 2025-07-28","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7654-5","summary":"Ubuntu Security Notice USN-7654-5 vom 2025-07-29","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-11861.html","summary":"Oracle Linux Security Advisory ELSA-2025-11861 vom 2025-07-30","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-11855.html","summary":"Oracle Linux Security Advisory ELSA-2025-11855 vom 2025-07-30","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2025-098.html","summary":"Amazon Linux Security Advisory ALAS2KERNEL-5.10-2025-098 vom 2025-08-05","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-105.html","summary":"Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-105 vom 2025-08-05","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7686-1","summary":"Ubuntu Security Notice USN-7686-1 vom 2025-08-05","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-106.html","summary":"Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-106 vom 2025-08-09","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:13589","summary":"Red Hat Security Advisory RHSA-2025:13589 vom 2025-08-11","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:13590","summary":"Red Hat Security Advisory RHSA-2025:13590 vom 2025-08-11","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:13598","summary":"Red Hat Security Advisory RHSA-2025:13598 vom 2025-08-11","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-13589.html","summary":"Oracle Linux Security Advisory ELSA-2025-13589 vom 2025-08-12","category":"external"},{"url":"https://lists.debian.org/debian-security-announce/2025/msg00137.html","summary":"Debian Security Advisory DSA-5973 vom 2025-08-12","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html","summary":"Debian Security Advisory DLA-4271 vom 2025-08-13","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-13598.html","summary":"Oracle Linux Security Advisory ELSA-2025-13598 vom 2025-08-15","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:13962","summary":"Red Hat Security Advisory RHSA-2025:13962 vom 2025-08-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022193.html","summary":"SUSE Security Update SUSE-SU-2025:02848-1 vom 2025-08-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022202.html","summary":"SUSE Security Update SUSE-SU-2025:02851-1 vom 2025-08-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022201.html","summary":"SUSE Security Update SUSE-SU-2025:02852-1 vom 2025-08-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022203.html","summary":"SUSE Security Update SUSE-SU-2025:02850-1 vom 2025-08-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022200.html","summary":"SUSE Security Update SUSE-SU-2025:02853-1 vom 2025-08-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022204.html","summary":"SUSE Security Update SUSE-SU-2025:02849-1 vom 2025-08-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022192.html","summary":"SUSE Security Update SUSE-SU-2025:02846-1 vom 2025-08-18","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:14009","summary":"Red Hat Security Advisory RHSA-2025:14009 vom 2025-08-18","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7699-1","summary":"Ubuntu Security Notice USN-7699-1 vom 2025-08-18","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2-2025-2968.html","summary":"Amazon Linux Security Advisory ALAS2-2025-2968 vom 2025-08-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022237.html","summary":"SUSE Security Update SUSE-SU-2025:02923-1 vom 2025-08-20","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-13962.html","summary":"Oracle Linux Security Advisory ELSA-2025-13962 vom 2025-08-20","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7699-2","summary":"Ubuntu Security Notice USN-7699-2 vom 2025-08-20","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-14009.html","summary":"Oracle Linux Security Advisory ELSA-2025-14009 vom 2025-08-22","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7711-1","summary":"Ubuntu Security Notice USN-7711-1 vom 2025-08-22","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7712-1","summary":"Ubuntu Security Notice USN-7712-1 vom 2025-08-22","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022259.html","summary":"SUSE Security Update SUSE-SU-2025:02969-1 vom 2025-08-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022283.html","summary":"SUSE Security Update SUSE-SU-2025:02997-1 vom 2025-08-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html","summary":"SUSE Security Update SUSE-SU-2025:02996-1 vom 2025-08-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html","summary":"SUSE Security Update SUSE-SU-2025:20577-1 vom 2025-08-28","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022295.html","summary":"SUSE Security Update SUSE-SU-2025:20586-1 vom 2025-08-28","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022327.html","summary":"SUSE Security Update SUSE-SU-2025:03011-1 vom 2025-08-28","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7721-1","summary":"Ubuntu Security Notice USN-7721-1 vom 2025-08-28","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022362.html","summary":"SUSE Security Update SUSE-SU-2025:20602-1 vom 2025-08-29","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022329.html","summary":"SUSE Security Update SUSE-SU-2025:03023-1 vom 2025-08-29","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html","summary":"SUSE Security Update SUSE-SU-2025:20601-1 vom 2025-08-29","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7712-2","summary":"Ubuntu Security Notice USN-7712-2 vom 2025-09-02","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:15224","summary":"Red Hat Security Advisory RHSA-2025:15224 vom 2025-09-04","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:15227","summary":"Red Hat Security Advisory RHSA-2025:15227 vom 2025-09-04","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-15011.html","summary":"Oracle Linux Security Advisory ELSA-2025-15011 vom 2025-09-03","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2025-103.html","summary":"Amazon Linux Security Advisory ALAS2KERNEL-5.10-2025-103 vom 2025-09-04","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2025-088.html","summary":"Amazon Linux Security Advisory ALAS2KERNEL-5.15-2025-088 vom 2025-09-04","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-20551.html","summary":"Oracle Linux Security Advisory ELSA-2025-20551 vom 2025-09-09","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2025:13590","summary":"Rocky Linux Security Advisory RLSA-2025:13590 vom 2025-09-08","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-20552.html","summary":"Oracle Linux Security Advisory ELSA-2025-20552 vom 2025-09-09","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-20553.html","summary":"Oracle Linux Security Advisory ELSA-2025-20553 vom 2025-09-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:15660","summary":"Red Hat Security Advisory RHSA-2025:15660 vom 2025-09-11","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:15658","summary":"Red Hat Security Advisory RHSA-2025:15658 vom 2025-09-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:15649","summary":"Red Hat Security Advisory RHSA-2025:15649 vom 2025-09-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:15647","summary":"Red Hat Security Advisory RHSA-2025:15647 vom 2025-09-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html","summary":"SUSE Security Update SUSE-SU-2025:20669-1 vom 2025-09-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:15670","summary":"Red Hat Security Advisory RHSA-2025:15670 vom 2025-09-11","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022432.html","summary":"SUSE Security Update SUSE-SU-2025:20653-1 vom 2025-09-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:15668","summary":"Red Hat Security Advisory RHSA-2025:15668 vom 2025-09-11","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-15447.html","summary":"Oracle Linux Security Advisory ELSA-2025-15447 vom 2025-09-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022522.html","summary":"SUSE Security Update SUSE-SU-2025:03204-1 vom 2025-09-12","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-15785.html","summary":"Oracle Linux Security Advisory ELSA-2025-15785 vom 2025-09-16","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-109.html","summary":"Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-109 vom 2025-09-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022589.html","summary":"SUSE Security Update SUSE-SU-2025:03272-1 vom 2025-09-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022602.html","summary":"SUSE Security Update SUSE-SU-2025:03290-1 vom 2025-09-22","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022605.html","summary":"SUSE Security Update SUSE-SU-2025:03301-1 vom 2025-09-23","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022621.html","summary":"SUSE Security Update SUSE-SU-2025:03315-1 vom 2025-09-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022620.html","summary":"SUSE Security Update SUSE-SU-2025:03319-1 vom 2025-09-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022619.html","summary":"SUSE Security Update SUSE-SU-2025:03317-1 vom 2025-09-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022617.html","summary":"SUSE Security Update SUSE-SU-2025:03321-1 vom 2025-09-24","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7769-2","summary":"Ubuntu Security Notice USN-7769-2 vom 2025-09-24","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7770-1","summary":"Ubuntu Security Notice USN-7770-1 vom 2025-09-24","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKXOSPRZJUZDU6VCQLCJK56ZS5CAS3IE/","summary":"SUSE Security Update SUSE-SU-2025:03344-1 vom 2025-09-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022628.html","summary":"SUSE Security Update SUSE-SU-2025:03343-1 vom 2025-09-24","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7771-1","summary":"Ubuntu Security Notice USN-7771-1 vom 2025-09-24","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7769-1","summary":"Ubuntu Security Notice USN-7769-1 vom 2025-09-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022629.html","summary":"SUSE Security Update SUSE-SU-2025:03341-1 vom 2025-09-24","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7774-1","summary":"Ubuntu Security Notice USN-7774-1 vom 2025-09-25","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7774-3","summary":"Ubuntu Security Notice USN-7774-3 vom 2025-09-25","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7774-2","summary":"Ubuntu Security Notice USN-7774-2 vom 2025-09-25","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7775-1","summary":"Ubuntu Security Notice USN-7775-1 vom 2025-09-25","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7776-1","summary":"Ubuntu Security Notice USN-7776-1 vom 2025-09-25","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7769-3","summary":"Ubuntu Security Notice USN-7769-3 vom 2025-09-26","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7775-2","summary":"Ubuntu Security Notice USN-7775-2 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022720.html","summary":"SUSE Security Update SUSE-SU-2025:20730-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022710.html","summary":"SUSE Security Update SUSE-SU-2025:20731-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022674.html","summary":"SUSE Security Update SUSE-SU-2025:20768-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022651.html","summary":"SUSE Security Update SUSE-SU-2025:20790-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022669.html","summary":"SUSE Security Update SUSE-SU-2025:20771-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022709.html","summary":"SUSE Security Update SUSE-SU-2025:20735-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022673.html","summary":"SUSE Security Update SUSE-SU-2025:20769-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022718.html","summary":"SUSE Security Update SUSE-SU-2025:20737-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022698.html","summary":"SUSE Security Update SUSE-SU-2025:20733-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022660.html","summary":"SUSE Security Update SUSE-SU-2025:20787-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022655.html","summary":"SUSE Security Update SUSE-SU-2025:20785-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022697.html","summary":"SUSE Security Update SUSE-SU-2025:20738-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022668.html","summary":"SUSE Security Update SUSE-SU-2025:20774-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022699.html","summary":"SUSE Security Update SUSE-SU-2025:20734-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022683.html","summary":"SUSE Security Update SUSE-SU-2025:20722-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022689.html","summary":"SUSE Security Update SUSE-SU-2025:20723-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022671.html","summary":"SUSE Security Update SUSE-SU-2025:20772-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022682.html","summary":"SUSE Security Update SUSE-SU-2025:20724-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022691.html","summary":"SUSE Security Update SUSE-SU-2025:20727-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022652.html","summary":"SUSE Security Update SUSE-SU-2025:20789-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022690.html","summary":"SUSE Security Update SUSE-SU-2025:20728-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022681.html","summary":"SUSE Security Update SUSE-SU-2025:20725-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022711.html","summary":"SUSE Security Update SUSE-SU-2025:20739-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022713.html","summary":"SUSE Security Update SUSE-SU-2025:20784-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022654.html","summary":"SUSE Security Update SUSE-SU-2025:20786-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022672.html","summary":"SUSE Security Update SUSE-SU-2025:20770-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022721.html","summary":"SUSE Security Update SUSE-SU-2025:03382-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022692.html","summary":"SUSE Security Update SUSE-SU-2025:20726-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022714.html","summary":"SUSE Security Update SUSE-SU-2025:20729-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022653.html","summary":"SUSE Security Update SUSE-SU-2025:20788-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022703.html","summary":"SUSE Security Update SUSE-SU-2025:20756-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022734.html","summary":"SUSE Security Update SUSE-SU-2025:03408-1 vom 2025-09-29","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022725.html","summary":"SUSE Security Update SUSE-SU-2025:03419-1 vom 2025-09-29","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022726.html","summary":"SUSE Security Update SUSE-SU-2025:03418-1 vom 2025-09-29","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022730.html","summary":"SUSE Security Update SUSE-SU-2025:03412-1 vom 2025-09-29","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022733.html","summary":"SUSE Security Update SUSE-SU-2025:03410-1 vom 2025-09-29","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022732.html","summary":"SUSE Security Update SUSE-SU-2025:03406-1 vom 2025-09-29","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2025-091.html","summary":"Amazon Linux Security Advisory ALAS2KERNEL-5.15-2025-091 vom 2025-09-30","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7775-3","summary":"Ubuntu Security Notice USN-7775-3 vom 2025-10-01","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7789-1","summary":"Ubuntu Security Notice USN-7789-1 vom 2025-10-01","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7774-4","summary":"Ubuntu Security Notice USN-7774-4 vom 2025-10-01","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7774-5","summary":"Ubuntu Security Notice USN-7774-5 vom 2025-10-06","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7789-2","summary":"Ubuntu Security Notice USN-7789-2 vom 2025-10-08","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html","summary":"Debian Security Advisory DLA-4328 vom 2025-10-13","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html","summary":"Debian Security Advisory DLA-4327 vom 2025-10-13","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-20663.html","summary":"Oracle Linux Security Advisory ELSA-2025-20663 vom 2025-10-13","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-20716.html","summary":"Oracle Linux Security Advisory ELSA-2025-20716 vom 2025-10-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/022903.html","summary":"SUSE Security Update SUSE-SU-2025:03601-1 vom 2025-10-15","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VHWHH7ZSMFJ6PQZ3CBDGGCWHNBCWD26Z/","summary":"SUSE Security Update SUSE-SU-2025:03600-1 vom 2025-10-15","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BVPLWRQN6MVKFQDJSEKN2JP6PMSGIO4Q/","summary":"SUSE Security Update SUSE-SU-2025:03615-1 vom 2025-10-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/022908.html","summary":"SUSE Security Update SUSE-SU-2025:03602-1 vom 2025-10-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/022925.html","summary":"SUSE Security Update SUSE-SU-2025:03634-1 vom 2025-10-17","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O6BEPQBC4GULLYP5G3VVU4ZS37B7I6EV/","summary":"SUSE Security Update SUSE-SU-2025:03628-1 vom 2025-10-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html","summary":"SUSE Security Update SUSE-SU-2025:03633-1 vom 2025-10-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/022941.html","summary":"SUSE Security Update SUSE-SU-2025:03650-1 vom 2025-10-20","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/022942.html","summary":"SUSE Security Update SUSE-SU-2025:03638-1 vom 2025-10-20","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/022943.html","summary":"SUSE Security Update SUSE-SU-2025:03636-1 vom 2025-10-20","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html","summary":"SUSE Security Update SUSE-SU-2025:3716-1 vom 2025-10-22","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/022975.html","summary":"SUSE Security Update SUSE-SU-2025:3742-1 vom 2025-10-23","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V7WMM33D7UTTQM25T2XCVZHFJKIMM3TO/","summary":"SUSE Security Update SUSE-SU-2025:3742-1 vom 2025-10-23","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L5PU3QBFUI54V4YM7FX4AIWKDVDLIFMV/","summary":"SUSE Security Update SUSE-SU-2025:3762-1 vom 2025-10-23","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NMB6RXALFYMRMM4UK7R54RAQRCZJEBH4/","summary":"SUSE Security Update SUSE-SU-2025:3751-1 vom 2025-10-23","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZFR7CE7W5U4CT7EDERPCHLWSGEIHWJLA/","summary":"SUSE Security Update SUSE-SU-2025:3755-1 vom 2025-10-23","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLTPAKCOQABZPEY7O35CI42PHK5WNIUQ/","summary":"SUSE Security Update SUSE-SU-2025:3761-1 vom 2025-10-23","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BYXC2NBEEGHSFXWCA3DVT5LVZMZ5RRNP/","summary":"SUSE Security Update SUSE-SU-2025:3748-1 vom 2025-10-23","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/022991.html","summary":"SUSE Security Update SUSE-SU-2025:3765-1 vom 2025-10-23","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/022995.html","summary":"SUSE Security Update SUSE-SU-2025:3771-1 vom 2025-10-24","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JX5Y5NWCULMT7SH5C6ZUDMMTVZPLLOJC/","summary":"SUSE Security Update SUSE-SU-2025:3768-1 vom 2025-10-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023019.html","summary":"SUSE Security Update SUSE-SU-2025:20861-1 vom 2025-10-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html","summary":"SUSE Security Update SUSE-SU-2025:20851-1 vom 2025-10-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023054.html","summary":"SUSE Security Update SUSE-SU-2025:20876-1 vom 2025-10-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023047.html","summary":"SUSE Security Update SUSE-SU-2025:20883-1 vom 2025-10-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023056.html","summary":"SUSE Security Update SUSE-SU-2025:20874-1 vom 2025-10-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023055.html","summary":"SUSE Security Update SUSE-SU-2025:20875-1 vom 2025-10-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023053.html","summary":"SUSE Security Update SUSE-SU-2025:20877-1 vom 2025-10-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023057.html","summary":"SUSE Security Update SUSE-SU-2025:20873-1 vom 2025-10-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023045.html","summary":"SUSE Security Update SUSE-SU-2025:20885-1 vom 2025-10-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023052.html","summary":"SUSE Security Update SUSE-SU-2025:20878-1 vom 2025-10-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023039.html","summary":"SUSE Security Update SUSE-SU-2025:20891-1 vom 2025-10-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023049.html","summary":"SUSE Security Update SUSE-SU-2025:20881-1 vom 2025-10-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023044.html","summary":"SUSE Security Update SUSE-SU-2025:20886-1 vom 2025-10-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023043.html","summary":"SUSE Security Update SUSE-SU-2025:20887-1 vom 2025-10-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023048.html","summary":"SUSE Security Update SUSE-SU-2025:20882-1 vom 2025-10-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023040.html","summary":"SUSE Security Update SUSE-SU-2025:20890-1 vom 2025-10-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html","summary":"SUSE Security Update SUSE-SU-2025:20870-1 vom 2025-10-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023046.html","summary":"SUSE Security Update SUSE-SU-2025:20884-1 vom 2025-10-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023110.html","summary":"SUSE Security Update SUSE-SU-2025:20905-1 vom 2025-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023112.html","summary":"SUSE Security Update SUSE-SU-2025:20903-1 vom 2025-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023108.html","summary":"SUSE Security Update SUSE-SU-2025:20907-1 vom 2025-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023102.html","summary":"SUSE Security Update SUSE-SU-2025:20913-1 vom 2025-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023113.html","summary":"SUSE Security Update SUSE-SU-2025:20902-1 vom 2025-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023106.html","summary":"SUSE Security Update SUSE-SU-2025:20909-1 vom 2025-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023098.html","summary":"SUSE Security Update SUSE-SU-2025:20917-1 vom 2025-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023099.html","summary":"SUSE Security Update SUSE-SU-2025:20916-1 vom 2025-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023100.html","summary":"SUSE Security Update SUSE-SU-2025:20915-1 vom 2025-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html","summary":"SUSE Security Update SUSE-SU-2025:20898-1 vom 2025-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023101.html","summary":"SUSE Security Update SUSE-SU-2025:20914-1 vom 2025-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023095.html","summary":"SUSE Security Update SUSE-SU-2025:20920-1 vom 2025-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023103.html","summary":"SUSE Security Update SUSE-SU-2025:20912-1 vom 2025-10-30","category":"external"},{"url":"https://www.dell.com/support/kbdoc/000385435","summary":"Dell Security Advisory DSA-2025-404 vom 2025-10-31","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023111.html","summary":"SUSE Security Update SUSE-SU-2025:20904-1 vom 2025-10-30","category":"external"},{"url":"https://www.dell.com/support/kbdoc/000385230","summary":"Dell Security Advisory DSA-2025-390 vom 2025-11-05","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7861-1","summary":"Ubuntu Security Notice USN-7861-1 vom 2025-11-06","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7861-2","summary":"Ubuntu Security Notice USN-7861-2 vom 2025-11-07","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7864-1","summary":"Ubuntu Security Notice USN-7864-1 vom 2025-11-07","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:20095","summary":"Red Hat Security Advisory RHSA-2025:20095 vom 2025-11-11","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:20518","summary":"Red Hat Security Advisory RHSA-2025:20518 vom 2025-11-11","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-25757.html","summary":"Oracle Linux Security Advisory ELSA-2025-25757 vom 2025-11-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html","summary":"SUSE Security Update SUSE-SU-2025:20996-1 vom 2025-11-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html","summary":"SUSE Security Update SUSE-SU-2025:20994-1 vom 2025-11-12","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7861-3","summary":"Ubuntu Security Notice USN-7861-3 vom 2025-11-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:21667","summary":"Red Hat Security Advisory RHSA-2025:21667 vom 2025-11-18","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7861-4","summary":"Ubuntu Security Notice USN-7861-4 vom 2025-11-19","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2025:20518","summary":"Rocky Linux Security Advisory RLSA-2025:20518 vom 2025-11-21","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J4KLZE7HUQJ2N6IQEI3G2KJZ5VB36YBI/","summary":"openSUSE Security Update OPENSUSE-SU-2025-20081-1 vom 2025-11-26","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2025:20095","summary":"Rocky Linux Security Advisory RLSA-2025:20095 vom 2025-11-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html","summary":"SUSE Security Update SUSE-SU-2025:21074-1 vom 2025-11-28","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7861-5","summary":"Ubuntu Security Notice USN-7861-5 vom 2025-12-03","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7909-1","summary":"Ubuntu Security Notice USN-7909-1 vom 2025-12-04","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7909-3","summary":"Ubuntu Security Notice USN-7909-3 vom 2025-12-04","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7909-2","summary":"Ubuntu Security Notice USN-7909-2 vom 2025-12-04","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7910-1","summary":"Ubuntu Security Notice USN-7910-1 vom 2025-12-04","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7909-4","summary":"Ubuntu Security Notice USN-7909-4 vom 2025-12-05","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html","summary":"SUSE Security Update SUSE-SU-2025:21139-1 vom 2025-12-10","category":"external"},{"url":"http://linux.oracle.com/errata/ELSA-2025-28040.html","summary":"Oracle Linux Security Advisory ELSA-2025-28040 vom 2025-12-11","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html","summary":"SUSE Security Update SUSE-SU-2025:21179-1 vom 2025-12-10","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-28049.html","summary":"Oracle Linux Security Advisory ELSA-2025-28049 vom 2025-12-15","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7933-1","summary":"Ubuntu Security Notice USN-7933-1 vom 2025-12-15","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7909-5","summary":"Ubuntu Security Notice USN-7909-5 vom 2025-12-15","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7935-1","summary":"Ubuntu Security Notice USN-7935-1 vom 2025-12-16","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7938-1","summary":"Ubuntu Security Notice USN-7938-1 vom 2025-12-16","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7940-1","summary":"Ubuntu Security Notice USN-7940-1 vom 2025-12-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7940-2","summary":"Ubuntu Security Notice USN-7940-2 vom 2026-01-09","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:1143","summary":"Red Hat Security Advisory RHSA-2026:1143 vom 2026-01-26","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-1143.html","summary":"Oracle Linux Security Advisory ELSA-2026-1143 vom 2026-01-27","category":"external"},{"url":"https://www.dell.com/support/kbdoc/de-de/000421570/dsa-2026-030-security-update-for-dell-networker-vproxy-multiple-third-party-component-vulnerabilities","summary":"Dell Security Advisory DSA-2026-030 vom 2026-01-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html","summary":"SUSE Security Update SUSE-SU-2026:0350-1 vom 2026-01-30","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:1727","summary":"Red Hat Security Advisory RHSA-2026:1727 vom 2026-02-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html","summary":"SUSE Security Update SUSE-SU-2026:0369-1 vom 2026-02-03","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:1143","summary":"Rocky Linux Security Advisory RLSA-2026:1143 vom 2026-02-05","category":"external"},{"url":"https://lists.debian.org/debian-security-announce/2026/msg00036.html","summary":"Debian Security Advisory DSA-6127 vom 2026-02-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html","summary":"SUSE Security Update SUSE-SU-2026:0411-1 vom 2026-02-10","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2026/02/msg00017.html","summary":"Debian Security Advisory DLA-4476 vom 2026-02-11","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8028-1","summary":"Ubuntu Security Notice USN-8028-1 vom 2026-02-11","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2026/02/msg00016.html","summary":"Debian Security Advisory DLA-4475 vom 2026-02-11","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8028-2","summary":"Ubuntu Security Notice USN-8028-2 vom 2026-02-12","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8031-1","summary":"Ubuntu Security Notice USN-8031-1 vom 2026-02-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html","summary":"SUSE Security Update SUSE-SU-2026:0474-1 vom 2026-02-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024139.html","summary":"SUSE Security Update SUSE-SU-2026:0475-1 vom 2026-02-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024248.html","summary":"SUSE Security Update SUSE-SU-2026:0542-1 vom 2026-02-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html","summary":"SUSE Security Update SUSE-SU-2026:20309-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html","summary":"SUSE Security Update SUSE-SU-2026:0496-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html","summary":"SUSE Security Update SUSE-SU-2026:20310-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024159.html","summary":"SUSE Security Update SUSE-SU-2026:0495-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html","summary":"SUSE Security Update SUSE-SU-2026:20332-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024247.html","summary":"SUSE Security Update SUSE-SU-2026:0543-1 vom 2026-02-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html","summary":"SUSE Security Update SUSE-SU-2026:20331-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024249.html","summary":"SUSE Security Update SUSE-SU-2026:0539-1 vom 2026-02-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024250.html","summary":"SUSE Security Update SUSE-SU-2026:0535-1 vom 2026-02-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024252.html","summary":"SUSE Security Update SUSE-SU-2026:0528-1 vom 2026-02-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024253.html","summary":"SUSE Security Update SUSE-SU-2026:0526-1 vom 2026-02-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html","summary":"SUSE Security Update SUSE-SU-2026:20330-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html","summary":"SUSE Security Update SUSE-SU-2026:20316-1 vom 2026-02-13","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-2721.html","summary":"Oracle Linux Security Advisory ELSA-2026-2721 vom 2026-02-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024277.html","summary":"SUSE Security Update SUSE-SU-2026:0560-1 vom 2026-02-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024271.html","summary":"SUSE Security Update SUSE-SU-2026:0554-1 vom 2026-02-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024267.html","summary":"SUSE Security Update SUSE-SU-2026:0548-1 vom 2026-02-16","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2721","summary":"Red Hat Security Advisory RHSA-2026:2721 vom 2026-02-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024284.html","summary":"SUSE Security Update SUSE-SU-2026:0565-1 vom 2026-02-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024330.html","summary":"SUSE Security Update SUSE-SU-2026:0566-1 vom 2026-02-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8028-4","summary":"Ubuntu Security Notice USN-8028-4 vom 2026-02-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8028-5","summary":"Ubuntu Security Notice USN-8028-5 vom 2026-02-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8028-3","summary":"Ubuntu Security Notice USN-8028-3 vom 2026-02-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8031-2","summary":"Ubuntu Security Notice USN-8031-2 vom 2026-02-18","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8031-3","summary":"Ubuntu Security Notice USN-8031-3 vom 2026-02-19","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2026-113.html","summary":"Amazon Linux Security Advisory ALAS2KERNEL-5.10-2026-113 vom 2026-02-19","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8028-6","summary":"Ubuntu Security Notice USN-8028-6 vom 2026-02-19","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8052-1","summary":"Ubuntu Security Notice USN-8052-1 vom 2026-02-19","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8028-7","summary":"Ubuntu Security Notice USN-8028-7 vom 2026-02-19","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3066","summary":"Red Hat Security Advisory RHSA-2026:3066 vom 2026-02-23","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3088","summary":"Red Hat Security Advisory RHSA-2026:3088 vom 2026-02-23","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3083","summary":"Red Hat Security Advisory RHSA-2026:3083 vom 2026-02-23","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3110","summary":"Red Hat Security Advisory RHSA-2026:3110 vom 2026-02-23","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8052-2","summary":"Ubuntu Security Notice USN-8052-2 vom 2026-02-24","category":"external"},{"url":"http://linux.oracle.com/errata/ELSA-2026-3066.html","summary":"Oracle Linux Security Advisory ELSA-2026-3066 vom 2026-02-25","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8028-8","summary":"Ubuntu Security Notice USN-8028-8 vom 2026-02-24","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:2721","summary":"Rocky Linux Security Advisory RLSA-2026:2721 vom 2026-02-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html","summary":"SUSE Security Update SUSE-SU-2026:0617-1 vom 2026-02-24","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-3066.html","summary":"Oracle Linux Security Advisory ELSA-2026-3066 vom 2026-02-25","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-3083.html","summary":"Oracle Linux Security Advisory ELSA-2026-3083 vom 2026-02-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024426.html","summary":"SUSE Security Update SUSE-SU-2026:20458-1 vom 2026-02-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024425.html","summary":"SUSE Security Update SUSE-SU-2026:20459-1 vom 2026-02-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024424.html","summary":"SUSE Security Update SUSE-SU-2026:20460-1 vom 2026-02-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024420.html","summary":"SUSE Security Update SUSE-SU-2026:20464-1 vom 2026-02-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024423.html","summary":"SUSE Security Update SUSE-SU-2026:20461-1 vom 2026-02-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024421.html","summary":"SUSE Security Update SUSE-SU-2026:20463-1 vom 2026-02-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024429.html","summary":"SUSE Security Update SUSE-SU-2026:20455-1 vom 2026-02-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024422.html","summary":"SUSE Security Update SUSE-SU-2026:20462-1 vom 2026-02-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024428.html","summary":"SUSE Security Update SUSE-SU-2026:20456-1 vom 2026-02-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024427.html","summary":"SUSE Security Update SUSE-SU-2026:20457-1 vom 2026-02-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024474.html","summary":"SUSE Security Update SUSE-SU-2026:20500-1 vom 2026-02-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024463.html","summary":"SUSE Security Update SUSE-SU-2026:20512-1 vom 2026-02-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024464.html","summary":"SUSE Security Update SUSE-SU-2026:20511-1 vom 2026-02-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024475.html","summary":"SUSE Security Update SUSE-SU-2026:20499-1 vom 2026-02-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024471.html","summary":"SUSE Security Update SUSE-SU-2026:20503-1 vom 2026-02-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024473.html","summary":"SUSE Security Update SUSE-SU-2026:20501-1 vom 2026-02-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024460.html","summary":"SUSE Security Update SUSE-SU-2026:20515-1 vom 2026-02-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024472.html","summary":"SUSE Security Update SUSE-SU-2026:20502-1 vom 2026-02-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024462.html","summary":"SUSE Security Update SUSE-SU-2026:20513-1 vom 2026-02-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024490.html","summary":"SUSE Security Update SUSE-SU-2026:0674-1 vom 2026-02-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024461.html","summary":"SUSE Security Update SUSE-SU-2026:20514-1 vom 2026-02-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024511.html","summary":"SUSE Security Update SUSE-SU-2026:0725-1 vom 2026-03-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024512.html","summary":"SUSE Security Update SUSE-SU-2026:0713-1 vom 2026-03-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024513.html","summary":"SUSE Security Update SUSE-SU-2026:0711-1 vom 2026-03-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024508.html","summary":"SUSE Security Update SUSE-SU-2026:0734-1 vom 2026-03-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024509.html","summary":"SUSE Security Update SUSE-SU-2026:0731-1 vom 2026-03-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024510.html","summary":"SUSE Security Update SUSE-SU-2026:0727-1 vom 2026-03-02","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3520","summary":"Red Hat Security Advisory RHSA-2026:3520 vom 2026-03-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024524.html","summary":"SUSE Security Update SUSE-SU-2026:0748-1 vom 2026-03-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024520.html","summary":"SUSE Security Update SUSE-SU-2026:0736-1 vom 2026-03-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024521.html","summary":"SUSE Security Update SUSE-SU-2026:0745-1 vom 2026-03-02","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8074-2","summary":"Ubuntu Security Notice USN-8074-2 vom 2026-03-04","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8074-1","summary":"Ubuntu Security Notice USN-8074-1 vom 2026-03-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html","summary":"SUSE Security Update SUSE-SU-2026:20560-1 vom 2026-03-05","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2026-098.html","summary":"Amazon Linux Security Advisory ALAS2KERNEL-5.15-2026-098 vom 2026-03-06","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3966","summary":"Red Hat Security Advisory RHSA-2026:3966 vom 2026-03-09","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4012","summary":"Red Hat Security Advisory RHSA-2026:4012 vom 2026-03-09","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4111","summary":"Red Hat Security Advisory RHSA-2026:4111 vom 2026-03-09","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4244","summary":"Red Hat Security Advisory RHSA-2026:4244 vom 2026-03-11","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-4012.html","summary":"Oracle Linux Security Advisory ELSA-2026-4012 vom 2026-03-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4245","summary":"Red Hat Security Advisory RHSA-2026:4245 vom 2026-03-11","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4243","summary":"Red Hat Security Advisory RHSA-2026:4243 vom 2026-03-11","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4246","summary":"Red Hat Security Advisory RHSA-2026:4246 vom 2026-03-11","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-3966.html","summary":"Oracle Linux Security Advisory ELSA-2026-3966 vom 2026-03-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4242","summary":"Red Hat Security Advisory RHSA-2026:4242 vom 2026-03-11","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4444","summary":"Red Hat Security Advisory RHSA-2026:4444 vom 2026-03-12","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-50145.html","summary":"Oracle Linux Security Advisory ELSA-2026-50145 vom 2026-03-12","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8095-2","summary":"Ubuntu Security Notice USN-8095-2 vom 2026-03-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8096-1","summary":"Ubuntu Security Notice USN-8096-1 vom 2026-03-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8095-1","summary":"Ubuntu Security Notice USN-8095-1 vom 2026-03-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8096-2","summary":"Ubuntu Security Notice USN-8096-2 vom 2026-03-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8100-1","summary":"Ubuntu Security Notice USN-8100-1 vom 2026-03-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8096-3","summary":"Ubuntu Security Notice USN-8096-3 vom 2026-03-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8095-3","summary":"Ubuntu Security Notice USN-8095-3 vom 2026-03-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8096-4","summary":"Ubuntu Security Notice USN-8096-4 vom 2026-03-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024726.html","summary":"SUSE Security Update SUSE-SU-2026:20699-1 vom 2026-03-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024725.html","summary":"SUSE Security Update SUSE-SU-2026:20700-1 vom 2026-03-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024724.html","summary":"SUSE Security Update SUSE-SU-2026:20701-1 vom 2026-03-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024723.html","summary":"SUSE Security Update SUSE-SU-2026:20702-1 vom 2026-03-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024722.html","summary":"SUSE Security Update SUSE-SU-2026:20703-1 vom 2026-03-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024721.html","summary":"SUSE Security Update SUSE-SU-2026:20704-1 vom 2026-03-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024720.html","summary":"SUSE Security Update SUSE-SU-2026:20705-1 vom 2026-03-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024738.html","summary":"SUSE Security Update SUSE-SU-2026:20680-1 vom 2026-03-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024744.html","summary":"SUSE Security Update SUSE-SU-2026:20672-1 vom 2026-03-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024737.html","summary":"SUSE Security Update SUSE-SU-2026:20681-1 vom 2026-03-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024743.html","summary":"SUSE Security Update SUSE-SU-2026:20673-1 vom 2026-03-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024742.html","summary":"SUSE Security Update SUSE-SU-2026:20674-1 vom 2026-03-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024740.html","summary":"SUSE Security Update SUSE-SU-2026:20678-1 vom 2026-03-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024739.html","summary":"SUSE Security Update SUSE-SU-2026:20679-1 vom 2026-03-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024782.html","summary":"SUSE Security Update SUSE-SU-2026:0940-1 vom 2026-03-20","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024788.html","summary":"SUSE Security Update SUSE-SU-2026:0939-1 vom 2026-03-23","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8116-1","summary":"Ubuntu Security Notice USN-8116-1 vom 2026-03-23","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8095-4","summary":"Ubuntu Security Notice USN-8095-4 vom 2026-03-23","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8096-5","summary":"Ubuntu Security Notice USN-8096-5 vom 2026-03-23","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024814.html","summary":"SUSE Security Update SUSE-SU-2026:0983-1 vom 2026-03-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024889.html","summary":"SUSE Security Update SUSE-SU-2026:20800-1 vom 2026-03-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024857.html","summary":"SUSE Security Update SUSE-SU-2026:20777-1 vom 2026-03-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024887.html","summary":"SUSE Security Update SUSE-SU-2026:20802-1 vom 2026-03-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024881.html","summary":"SUSE Security Update SUSE-SU-2026:20808-1 vom 2026-03-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024837.html","summary":"SUSE Security Update SUSE-SU-2026:0985-1 vom 2026-03-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024880.html","summary":"SUSE Security Update SUSE-SU-2026:20809-1 vom 2026-03-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024888.html","summary":"SUSE Security Update SUSE-SU-2026:20801-1 vom 2026-03-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024896.html","summary":"SUSE Security Update SUSE-SU-2026:0997-1 vom 2026-03-25","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5690","summary":"Red Hat Security Advisory RHSA-2026:5690 vom 2026-03-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024853.html","summary":"SUSE Security Update SUSE-SU-2026:20781-1 vom 2026-03-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024848.html","summary":"SUSE Security Update SUSE-SU-2026:20786-1 vom 2026-03-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024847.html","summary":"SUSE Security Update SUSE-SU-2026:20787-1 vom 2026-03-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024869.html","summary":"SUSE Security Update SUSE-SU-2026:0992-1 vom 2026-03-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024849.html","summary":"SUSE Security Update SUSE-SU-2026:20785-1 vom 2026-03-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024879.html","summary":"SUSE Security Update SUSE-SU-2026:20810-1 vom 2026-03-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024846.html","summary":"SUSE Security Update SUSE-SU-2026:20788-1 vom 2026-03-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024886.html","summary":"SUSE Security Update SUSE-SU-2026:20803-1 vom 2026-03-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024854.html","summary":"SUSE Security Update SUSE-SU-2026:20780-1 vom 2026-03-24","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8125-1","summary":"Ubuntu Security Notice USN-8125-1 vom 2026-03-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024926.html","summary":"SUSE Security Update SUSE-SU-2026:1039-1 vom 2026-03-25","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8126-1","summary":"Ubuntu Security Notice USN-8126-1 vom 2026-03-25","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5821","summary":"Red Hat Security Advisory RHSA-2026:5821 vom 2026-03-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024902.html","summary":"SUSE Security Update SUSE-SU-2026:1000-1 vom 2026-03-25","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5813","summary":"Red Hat Security Advisory RHSA-2026:5813 vom 2026-03-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024904.html","summary":"SUSE Security Update SUSE-SU-2026:1002-1 vom 2026-03-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024929.html","summary":"SUSE Security Update SUSE-SU-2026:1046-1 vom 2026-03-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024940.html","summary":"SUSE Security Update SUSE-SU-2026:1059-1 vom 2026-03-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024955.html","summary":"SUSE Security Update SUSE-SU-2026:1073-1 vom 2026-03-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024934.html","summary":"SUSE Security Update SUSE-SU-2026:1048-1 vom 2026-03-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024933.html","summary":"SUSE Security Update SUSE-SU-2026:1049-1 vom 2026-03-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/025011.html","summary":"SUSE Security Update SUSE-SU-2026:1101-1 vom 2026-03-28","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024983.html","summary":"SUSE Security Update SUSE-SU-2026:20857-1 vom 2026-03-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024993.html","summary":"SUSE Security Update SUSE-SU-2026:20847-1 vom 2026-03-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024991.html","summary":"SUSE Security Update SUSE-SU-2026:20849-1 vom 2026-03-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024992.html","summary":"SUSE Security Update SUSE-SU-2026:20848-1 vom 2026-03-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024981.html","summary":"SUSE Security Update SUSE-SU-2026:20859-1 vom 2026-03-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024982.html","summary":"SUSE Security Update SUSE-SU-2026:20858-1 vom 2026-03-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024990.html","summary":"SUSE Security Update SUSE-SU-2026:20850-1 vom 2026-03-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/025019.html","summary":"SUSE Security Update SUSE-SU-2026:1125-1 vom 2026-03-28","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/025038.html","summary":"SUSE Security Update SUSE-SU-2026:20894-1 vom 2026-03-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/025039.html","summary":"SUSE Security Update SUSE-SU-2026:20893-1 vom 2026-03-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/025050.html","summary":"SUSE Security Update SUSE-SU-2026:20881-1 vom 2026-03-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/025041.html","summary":"SUSE Security Update SUSE-SU-2026:20891-1 vom 2026-03-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/025040.html","summary":"SUSE Security Update SUSE-SU-2026:20892-1 vom 2026-03-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/025049.html","summary":"SUSE Security Update SUSE-SU-2026:20882-1 vom 2026-03-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/025051.html","summary":"SUSE Security Update SUSE-SU-2026:20880-1 vom 2026-03-30","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6193","summary":"Red Hat Security Advisory RHSA-2026:6193 vom 2026-03-30","category":"external"},{"url":"https://oss.oracle.com/pipermail/el-errata/2026-March/020110.html","summary":"Oracle Linux Security Advisory ELSA-2026-50171 vom 2026-03-31","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6310","summary":"Red Hat Security Advisory RHSA-2026:6310 vom 2026-04-01","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7268179","summary":"IBM Security Bulletin 7268179 vom 2026-03-31","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8141-1","summary":"Ubuntu Security Notice USN-8141-1 vom 2026-04-01","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8095-5","summary":"Ubuntu Security Notice USN-8095-5 vom 2026-04-01","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6632","summary":"Red Hat Security Advisory RHSA-2026:6632 vom 2026-04-06","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6570","summary":"Red Hat Security Advisory RHSA-2026:6570 vom 2026-04-06","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:7100","summary":"Red Hat Security Advisory RHSA-2026:7100 vom 2026-04-08","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-6632.html","summary":"Oracle Linux Security Advisory ELSA-2026-6632 vom 2026-04-08","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:7013","summary":"Red Hat Security Advisory RHSA-2026:7013 vom 2026-04-08","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-6570.html","summary":"Oracle Linux Security Advisory ELSA-2026-6570 vom 2026-04-08","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://lore.kernel.org/linux-cve-announce/","published":"2025-07-02","updated":"2026-04-08","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-09T09:00:51.479Z","sourceUrl":"https://lore.kernel.org/linux-cve-announce/","added":"2026-04-08T00:00:00.000Z","public_url":"https://lore.kernel.org/linux-cve-announce/","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-w-2025-1452 cve-2025-38091 linux kernel: mehrere schwachstellen bsi bsi","public_published":"2025-07-02","public_updated":"2026-04-08","public_display_date":"2026-04-08","public_sort_date":"2026-04-08","public_period_date":"2026-04-08"},{"id":"BSI:WID-SEC-W-2025-1465","cve":"CVE-2025-38177","title":"Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2025-07-06","published":"2025-07-06","updated":"2026-04-08","source_published":"2025-07-06","source_updated":"2026-04-08","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://lore.kernel.org/linux-cve-announce/","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1465.json","summary":"WID-SEC-W-2025-1465 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1465","summary":"WID-SEC-2025-1465 - Portal Version","category":"self"},{"url":"https://lore.kernel.org/linux-cve-announce/","summary":"Kernel CVE Announce Mailingliste","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070411-CVE-2025-38177-bd6c@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38177","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070407-CVE-2025-38178-8846@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38178","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070410-CVE-2025-38179-45b4@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38179","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070410-CVE-2025-38180-c6d0@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38180","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070411-CVE-2025-38181-3497@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38181","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070411-CVE-2025-38182-fd0c@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38182","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070411-CVE-2025-38183-1283@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38183","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070412-CVE-2025-38184-d45c@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38184","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070412-CVE-2025-38185-76cb@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38185","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070412-CVE-2025-38186-6542@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38186","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070413-CVE-2025-38187-dafd@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38187","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070413-CVE-2025-38188-e0a5@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38188","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070414-CVE-2025-38189-5706@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38189","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070414-CVE-2025-38190-5b22@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38190","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070414-CVE-2025-38191-ee47@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38191","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070415-CVE-2025-38192-6a15@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38192","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070415-CVE-2025-38193-0fb1@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38193","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070415-CVE-2025-38194-1c50@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38194","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070416-CVE-2025-38195-1f8b@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38195","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070416-CVE-2025-38196-ba59@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38196","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070416-CVE-2025-38197-0bd2@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38197","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070417-CVE-2025-38198-b902@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38198","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070417-CVE-2025-38199-287e@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38199","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070418-CVE-2025-38200-47d9@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38200","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070418-CVE-2025-38201-9575@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38201","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070418-CVE-2025-38202-bef0@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38202","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070419-CVE-2025-38203-8c33@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38203","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070419-CVE-2025-38204-c216@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38204","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070419-CVE-2025-38205-0316@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38205","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070420-CVE-2025-38206-a077@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38206","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070420-CVE-2025-38207-e2ea@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38207","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070420-CVE-2025-38208-97e1@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38208","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070421-CVE-2025-38209-52b8@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38209","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070421-CVE-2025-38210-3804@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38210","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070422-CVE-2025-38211-215a@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38211","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070422-CVE-2025-38212-5bd9@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38212","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070422-CVE-2025-38213-c3e3@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38213","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070423-CVE-2025-38214-539a@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38214","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070423-CVE-2025-38215-ddbd@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38215","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070423-CVE-2025-38216-7786@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38216","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070424-CVE-2025-38217-d1ab@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38217","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070424-CVE-2025-38218-a5e8@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38218","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070424-CVE-2025-38219-b284@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38219","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070425-CVE-2025-38220-a235@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38220","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070425-CVE-2025-38221-f152@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38221","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070426-CVE-2025-38222-3cfe@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38222","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070426-CVE-2025-38223-2e38@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38223","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070426-CVE-2025-38224-5e01@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38224","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070427-CVE-2025-38225-75f6@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38225","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070427-CVE-2025-38226-e5b5@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38226","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070427-CVE-2025-38227-f91b@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38227","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070428-CVE-2025-38228-67fb@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38228","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070428-CVE-2025-38229-d2d5@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38229","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070429-CVE-2025-38230-e106@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38230","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070429-CVE-2025-38231-c61c@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38231","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070429-CVE-2025-38232-8112@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38232","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070430-CVE-2025-38233-38e0@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38233","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070430-CVE-2025-38234-6984@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38234","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070619-CVE-2025-38235-0098@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38235","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7653-1","summary":"Ubuntu Security Notice USN-7653-1 vom 2025-07-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7649-1","summary":"Ubuntu Security Notice USN-7649-1 vom 2025-07-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7650-1","summary":"Ubuntu Security Notice USN-7650-1 vom 2025-07-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7655-1","summary":"Ubuntu Security Notice USN-7655-1 vom 2025-07-18","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7649-2","summary":"Ubuntu Security Notice USN-7649-2 vom 2025-07-22","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7665-1","summary":"Ubuntu Security Notice USN-7665-1 vom 2025-07-22","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7665-2","summary":"Ubuntu Security Notice USN-7665-2 vom 2025-07-24","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7671-1","summary":"Ubuntu Security Notice USN-7671-1 vom 2025-07-25","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7671-2","summary":"Ubuntu Security Notice USN-7671-2 vom 2025-07-29","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VQYPF6FAXKWBHQ4POBUPZVPW4L73XJR5/","summary":"SUSE Security Update SUSE-SU-2025:02588-1 vom 2025-08-01","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2025-100.html","summary":"Amazon Linux Security Advisory ALAS2KERNEL-5.10-2025-100 vom 2025-08-05","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2025-098.html","summary":"Amazon Linux Security Advisory ALAS2KERNEL-5.10-2025-098 vom 2025-08-05","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7671-3","summary":"Ubuntu Security Notice USN-7671-3 vom 2025-08-04","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7686-1","summary":"Ubuntu Security Notice USN-7686-1 vom 2025-08-05","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2025-101.html","summary":"Amazon Linux Security Advisory ALAS2KERNEL-5.10-2025-101 vom 2025-08-09","category":"external"},{"url":"https://lists.debian.org/debian-security-announce/2025/msg00137.html","summary":"Debian Security Advisory DSA-5973 vom 2025-08-12","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html","summary":"Debian Security Advisory DLA-4271 vom 2025-08-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022200.html","summary":"SUSE Security Update SUSE-SU-2025:02853-1 vom 2025-08-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022201.html","summary":"SUSE Security Update SUSE-SU-2025:02852-1 vom 2025-08-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022204.html","summary":"SUSE Security Update SUSE-SU-2025:02849-1 vom 2025-08-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022202.html","summary":"SUSE Security Update SUSE-SU-2025:02851-1 vom 2025-08-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022194.html","summary":"SUSE Security Update SUSE-SU-2025:02844-1 vom 2025-08-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022192.html","summary":"SUSE Security Update SUSE-SU-2025:02846-1 vom 2025-08-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022203.html","summary":"SUSE Security Update SUSE-SU-2025:02850-1 vom 2025-08-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022193.html","summary":"SUSE Security Update SUSE-SU-2025:02848-1 vom 2025-08-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022237.html","summary":"SUSE Security Update SUSE-SU-2025:02923-1 vom 2025-08-20","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:14413","summary":"Red Hat Security Advisory RHSA-2025:14413 vom 2025-08-25","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7712-1","summary":"Ubuntu Security Notice USN-7712-1 vom 2025-08-22","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022259.html","summary":"SUSE Security Update SUSE-SU-2025:02969-1 vom 2025-08-25","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:14438","summary":"Red Hat Security Advisory RHSA-2025:14438 vom 2025-08-25","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:14510","summary":"Red Hat Security Advisory RHSA-2025:14510 vom 2025-08-25","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:14511","summary":"Red Hat Security Advisory RHSA-2025:14511 vom 2025-08-25","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:14696","summary":"Red Hat Security Advisory RHSA-2025:14696 vom 2025-08-27","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:14692","summary":"Red Hat Security Advisory RHSA-2025:14692 vom 2025-08-27","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-14438.html","summary":"Oracle Linux Security Advisory ELSA-2025-14438 vom 2025-08-26","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:14691","summary":"Red Hat Security Advisory RHSA-2025:14691 vom 2025-08-27","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:14742","summary":"Red Hat vom 2025-08-27","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-14510.html","summary":"Oracle Linux Security Advisory ELSA-2025-14510 vom 2025-08-27","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:14746","summary":"Red Hat Security Advisory RHSA-2025:14746 vom 2025-08-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html","summary":"SUSE Security Update SUSE-SU-2025:02996-1 vom 2025-08-27","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:14748","summary":"Red Hat Security Advisory RHSA-2025:14748 vom 2025-08-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022283.html","summary":"SUSE Security Update SUSE-SU-2025:02997-1 vom 2025-08-27","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:14744","summary":"Red Hat Security Advisory RHSA-2025:14744 vom 2025-08-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html","summary":"SUSE Security Update SUSE-SU-2025:20577-1 vom 2025-08-28","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022295.html","summary":"SUSE Security Update SUSE-SU-2025:20586-1 vom 2025-08-28","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022327.html","summary":"SUSE Security Update SUSE-SU-2025:03011-1 vom 2025-08-28","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7721-1","summary":"Ubuntu Security Notice USN-7721-1 vom 2025-08-28","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022362.html","summary":"SUSE Security Update SUSE-SU-2025:20602-1 vom 2025-08-29","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022329.html","summary":"SUSE Security Update SUSE-SU-2025:03023-1 vom 2025-08-29","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html","summary":"SUSE Security Update SUSE-SU-2025:20601-1 vom 2025-08-29","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:15009","summary":"Red Hat Security Advisory","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:15035","summary":"Red Hat Security Advisory RHSA-2025:15035 vom 2025-09-02","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:15011","summary":"Red Hat Security Advisory RHSA-2025:15011 vom 2025-09-02","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:15005","summary":"Red Hat Security Advisory RHSA-2025:15005 vom 2025-09-02","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:15016","summary":"Red Hat Security Advisory RHSA-2025:15016 vom 2025-09-02","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:15008","summary":"Red Hat Security Advisory RHSA-2025:15008 vom 2025-09-02","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7712-2","summary":"Ubuntu Security Notice USN-7712-2 vom 2025-09-02","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-15011.html","summary":"Oracle Linux Security Advisory ELSA-2025-15011 vom 2025-09-03","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-15008.html","summary":"Oracle Linux Security Advisory ELSA-2025-15008 vom 2025-09-04","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-108.html","summary":"Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-108 vom 2025-09-04","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2025-103.html","summary":"Amazon Linux Security Advisory ALAS2KERNEL-5.10-2025-103 vom 2025-09-04","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2-2025-2988.html","summary":"Amazon Linux Security Advisory ALAS2-2025-2988 vom 2025-09-04","category":"external"},{"url":"http://linux.oracle.com/errata/ELSA-2025-15005.html","summary":"Oracle Linux Security Advisory ELSA-2025-15005 vom 2025-09-05","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2025-088.html","summary":"Amazon Linux Security Advisory ALAS2KERNEL-5.15-2025-088 vom 2025-09-04","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-20552.html","summary":"Oracle Linux Security Advisory ELSA-2025-20552 vom 2025-09-09","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2025:15009","summary":"Rocky Linux Security Advisory RLSA-2025:15009 vom 2025-09-08","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-20551.html","summary":"Oracle Linux Security Advisory ELSA-2025-20551 vom 2025-09-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022407.html","summary":"SUSE Security Update SUSE-SU-2025:03097-1 vom 2025-09-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022403.html","summary":"SUSE Security Update SUSE-SU-2025:03106-1 vom 2025-09-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022404.html","summary":"SUSE Security Update SUSE-SU-2025:03105-1 vom 2025-09-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022405.html","summary":"SUSE Security Update SUSE-SU-2025:03104-1 vom 2025-09-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022406.html","summary":"SUSE Security Update SUSE-SU-2025:03100-1 vom 2025-09-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022420.html","summary":"SUSE Security Update SUSE-SU-2025:03124-1 vom 2025-09-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022421.html","summary":"SUSE Security Update SUSE-SU-2025:03123-1 vom 2025-09-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022408.html","summary":"SUSE Security Update SUSE-SU-2025:03111-1 vom 2025-09-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022410.html","summary":"SUSE Security Update SUSE-SU-2025:03109-1 vom 2025-09-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022409.html","summary":"SUSE Security Update SUSE-SU-2025:03110-1 vom 2025-09-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022413.html","summary":"SUSE Security Update SUSE-SU-2025:03108-1 vom 2025-09-09","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-20553.html","summary":"Oracle Linux Security Advisory ELSA-2025-20553 vom 2025-09-10","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RJXQ5TFHHXOY34RCSJPZ32PXICETJJAT/","summary":"SUSE Security Update SUSE-SU-2025:03124-1 vom 2025-09-09","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7CCY6DKZJO7PCHILWH75NOVEXGURPSD6/","summary":"SUSE Security Update SUSE-SU-2025:03126-1 vom 2025-09-10","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZ5OVD3NDO3IO5VFL4TPUPPITNIDWYHO/","summary":"SUSE Security Update SUSE-SU-2025:03154-1 vom 2025-09-10","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KL7TCGLOGAEZPEK22WSOTSLUVEYL4NV4/","summary":"SUSE Security Update SUSE-SU-2025:03149-1 vom 2025-09-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022450.html","summary":"SUSE Security Update SUSE-SU-2025:03146-1 vom 2025-09-10","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JSGN3FPXV4F5PS6ALJI4LDALZZFJF4X6/","summary":"SUSE Security Update SUSE-SU-2025:03129-1 vom 2025-09-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022451.html","summary":"SUSE Security Update SUSE-SU-2025:03143-1 vom 2025-09-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022452.html","summary":"SUSE Security Update SUSE-SU-2025:03138-1 vom 2025-09-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html","summary":"SUSE Security Update SUSE-SU-2025:20669-1 vom 2025-09-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022453.html","summary":"SUSE Security Update SUSE-SU-2025:03135-1 vom 2025-09-10","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V33OXMTSQPWHGZ67MZJKGCDT5YZ4TEOJ/","summary":"SUSE Security Update SUSE-SU-2025:03148-1 vom 2025-09-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022432.html","summary":"SUSE Security Update SUSE-SU-2025:20653-1 vom 2025-09-10","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GPXQD3DPL2SORN47JCZGU5CUIOW6M5KO/","summary":"SUSE Security Update SUSE-SU-2025:03153-1 vom 2025-09-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:15669","summary":"Red Hat Security Advisory RHSA-2025:15669 vom 2025-09-11","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OI7XTGACEWQ2UDCZMU7BMJ53EJTK4DLT/","summary":"SUSE Security Update SUSE-SU-2025:03130-1 vom 2025-09-10","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FZBFMSZ4U55ZVJTNY6LCDIN7SJ6ILOCQ/","summary":"SUSE Security Update SUSE-SU-2025:03133-1 vom 2025-09-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:15657","summary":"Red Hat Security Advisory RHSA-2025:15657 vom 2025-09-10","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HSLXEYDHEPXZRRM6QVD2CNPFQE4HV4IH/","summary":"SUSE Security Update SUSE-SU-2025:03156-1 vom 2025-09-11","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOJ3BLGCOAZQRWDUEHV2BT6IRFKBNKQD/","summary":"SUSE Security Update SUSE-SU-2025:03160-1 vom 2025-09-11","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022489.html","summary":"SUSE Security Update SUSE-SU-2025:03160-1 vom 2025-09-11","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022504.html","summary":"SUSE Security Update SUSE-SU-2025:03180-1 vom 2025-09-11","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022497.html","summary":"SUSE Security Update SUSE-SU-2025:03175-1 vom 2025-09-11","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022505.html","summary":"SUSE Security Update SUSE-SU-2025:03179-1 vom 2025-09-11","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022499.html","summary":"SUSE Security Update SUSE-SU-2025:03165-1 vom 2025-09-11","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022510.html","summary":"SUSE Security Update SUSE-SU-2025:03184-1 vom 2025-09-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022511.html","summary":"SUSE Security Update SUSE-SU-2025:03183-1 vom 2025-09-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022507.html","summary":"SUSE Security Update SUSE-SU-2025:03188-1 vom 2025-09-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022508.html","summary":"SUSE Security Update SUSE-SU-2025:03186-1 vom 2025-09-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022512.html","summary":"SUSE Security Update SUSE-SU-2025:03182-1 vom 2025-09-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022513.html","summary":"SUSE Security Update SUSE-SU-2025:03181-1 vom 2025-09-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022509.html","summary":"SUSE Security Update SUSE-SU-2025:03185-1 vom 2025-09-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022514.html","summary":"SUSE Security Update SUSE-SU-2025:03195-1 vom 2025-09-12","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3DJFSGXW57OBADJSADLDS4DFUIIYMM5/","summary":"openSUSE Security Update OPENSUSE-SU-2025:15544-1 vom 2025-09-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022515.html","summary":"SUSE Security Update SUSE-SU-2025:03194-1 vom 2025-09-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022518.html","summary":"SUSE Security Update SUSE-SU-2025:03190-1 vom 2025-09-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022522.html","summary":"SUSE Security Update SUSE-SU-2025:03204-1 vom 2025-09-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022516.html","summary":"SUSE Security Update SUSE-SU-2025:03191-1 vom 2025-09-12","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GJRKNIFHDBLMHUKUVMEPO5FMMOENSJDC/","summary":"SUSE Security Update SUSE-SU-2025:03210-1 vom 2025-09-15","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SI5FWXKGVFXNXOGXANHAQLN7YCH4PQSM/","summary":"SUSE Security Update SUSE-SU-2025:03212-1 vom 2025-09-15","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FCJ5F7EXAMZA2ML2FG2TKRM6YKENDJTU/","summary":"SUSE Security Update SUSE-SU-2025:03208-1 vom 2025-09-15","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SYKN5NGIGIUIQOD7ME5J7EMEHPSJ3AGG/","summary":"SUSE Security Update SUSE-SU-2025:03209-1 vom 2025-09-15","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ARIGSB3S5PEL45ZI3ENXG7FTEPKRDDOZ/","summary":"SUSE Security Update SUSE-SU-2025:03213-1 vom 2025-09-15","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H4NE32XTYMA5XWYTROHYSPTMHCEHAMJN/","summary":"SUSE Security Update SUSE-SU-2025:03207-1 vom 2025-09-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022526.html","summary":"SUSE Security Update SUSE-SU-2025:03215-1 vom 2025-09-15","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IPSTDHJ7NYTWDEVA2BAJRIC6CPADVZKP/","summary":"SUSE Security Update SUSE-SU-2025:03214-1 vom 2025-09-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022537.html","summary":"SUSE Security Update SUSE-SU-2025:03217-1 vom 2025-09-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022535.html","summary":"SUSE Security Update SUSE-SU-2025:03221-1 vom 2025-09-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022534.html","summary":"SUSE Security Update SUSE-SU-2025:03223-1 vom 2025-09-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022536.html","summary":"SUSE Security Update SUSE-SU-2025:03222-1 vom 2025-09-15","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CEHWYIR3R7GHFMEAF5GZVX6OYPVERDIJ/","summary":"SUSE Security Update SUSE-SU-2025:03226-1 vom 2025-09-16","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-109.html","summary":"Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-109 vom 2025-09-16","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2-2025-3001.html","summary":"Amazon Linux Security Advisory ALAS2-2025-3001 vom 2025-09-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MF553NWCYBV4FBND2WDCKV7U6FU5XZBI/","summary":"SUSE Security Update SUSE-SU-2025:03235-1 vom 2025-09-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022564.html","summary":"SUSE Security Update SUSE-SU-2025:20708-1 vom 2025-09-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022558.html","summary":"SUSE Security Update SUSE-SU-2025:20714-1 vom 2025-09-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022559.html","summary":"SUSE Security Update SUSE-SU-2025:20713-1 vom 2025-09-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022569.html","summary":"SUSE Security Update SUSE-SU-2025:20703-1 vom 2025-09-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022568.html","summary":"SUSE Security Update SUSE-SU-2025:20704-1 vom 2025-09-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022567.html","summary":"SUSE Security Update SUSE-SU-2025:20705-1 vom 2025-09-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022566.html","summary":"SUSE Security Update SUSE-SU-2025:20706-1 vom 2025-09-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022565.html","summary":"SUSE Security Update SUSE-SU-2025:20707-1 vom 2025-09-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022563.html","summary":"SUSE Security Update SUSE-SU-2025:20709-1 vom 2025-09-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022562.html","summary":"SUSE Security Update SUSE-SU-2025:20710-1 vom 2025-09-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022561.html","summary":"SUSE Security Update SUSE-SU-2025:20711-1 vom 2025-09-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022560.html","summary":"SUSE Security Update SUSE-SU-2025:20712-1 vom 2025-09-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022570.html","summary":"SUSE Security Update SUSE-SU-2025:20702-1 vom 2025-09-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022571.html","summary":"SUSE Security Update SUSE-SU-2025:20701-1 vom 2025-09-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022572.html","summary":"SUSE Security Update SUSE-SU-2025:20700-1 vom 2025-09-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022574.html","summary":"SUSE Security Update SUSE-SU-2025:20699-1 vom 2025-09-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022573.html","summary":"SUSE Security Update SUSE-SU-2025:20698-1 vom 2025-09-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022589.html","summary":"SUSE Security Update SUSE-SU-2025:03272-1 vom 2025-09-18","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-15782.html","summary":"Oracle Linux Security Advisory ELSA-2025-15782 vom 2025-09-19","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-14987.html","summary":"Oracle Linux Security Advisory ELSA-2025-14987 vom 2025-09-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022588.html","summary":"SUSE Security Update SUSE-SU-2025:02844-2 vom 2025-09-18","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-14748.html","summary":"Oracle Linux Security Advisory ELSA-2025-14748 vom 2025-09-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022596.html","summary":"SUSE Security Update SUSE-SU-2025:03283-1 vom 2025-09-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022602.html","summary":"SUSE Security Update SUSE-SU-2025:03290-1 vom 2025-09-22","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022605.html","summary":"SUSE Security Update SUSE-SU-2025:03301-1 vom 2025-09-23","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022615.html","summary":"SUSE Security Update SUSE-SU-2025:03314-1 vom 2025-09-23","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022610.html","summary":"SUSE Security Update SUSE-SU-2025:03310-1 vom 2025-09-23","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022616.html","summary":"SUSE Security Update SUSE-SU-2025:03329-1 vom 2025-09-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022621.html","summary":"SUSE Security Update SUSE-SU-2025:03315-1 vom 2025-09-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022620.html","summary":"SUSE Security Update SUSE-SU-2025:03319-1 vom 2025-09-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022619.html","summary":"SUSE Security Update SUSE-SU-2025:03317-1 vom 2025-09-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022617.html","summary":"SUSE Security Update SUSE-SU-2025:03321-1 vom 2025-09-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022630.html","summary":"SUSE Security Update SUSE-SU-2025:03342-1 vom 2025-09-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:16669","summary":"Red Hat Security Advisory RHSA-2025:16669 vom 2025-09-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022629.html","summary":"SUSE Security Update SUSE-SU-2025:03341-1 vom 2025-09-24","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKXOSPRZJUZDU6VCQLCJK56ZS5CAS3IE/","summary":"SUSE Security Update SUSE-SU-2025:03344-1 vom 2025-09-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022635.html","summary":"SUSE Security Update SUSE-SU-2025:03350-1 vom 2025-09-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022625.html","summary":"SUSE Security Update SUSE-SU-2025:03339-1 vom 2025-09-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022626.html","summary":"SUSE Security Update SUSE-SU-2025:03337-1 vom 2025-09-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022628.html","summary":"SUSE Security Update SUSE-SU-2025:03343-1 vom 2025-09-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022627.html","summary":"SUSE Security Update SUSE-SU-2025:03336-1 vom 2025-09-24","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7774-1","summary":"Ubuntu Security Notice USN-7774-1 vom 2025-09-25","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7774-2","summary":"Ubuntu Security Notice USN-7774-2 vom 2025-09-25","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7774-3","summary":"Ubuntu Security Notice USN-7774-3 vom 2025-09-25","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7775-1","summary":"Ubuntu Security Notice USN-7775-1 vom 2025-09-25","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7776-1","summary":"Ubuntu Security Notice USN-7776-1 vom 2025-09-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022637.html","summary":"SUSE Security Update SUSE-SU-2025:03356-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022636.html","summary":"SUSE Security Update SUSE-SU-2025:03359-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022638.html","summary":"SUSE Security Update SUSE-SU-2025:03358-1 vom 2025-09-26","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7775-2","summary":"Ubuntu Security Notice USN-7775-2 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022690.html","summary":"SUSE Security Update SUSE-SU-2025:20728-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022653.html","summary":"SUSE Security Update SUSE-SU-2025:20788-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022724.html","summary":"SUSE Security Update SUSE-SU-2025:03383-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022677.html","summary":"SUSE Security Update SUSE-SU-2025:20764-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022675.html","summary":"SUSE Security Update SUSE-SU-2025:20766-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022674.html","summary":"SUSE Security Update SUSE-SU-2025:20768-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022678.html","summary":"SUSE Security Update SUSE-SU-2025:20765-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022666.html","summary":"SUSE Security Update SUSE-SU-2025:20776-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022673.html","summary":"SUSE Security Update SUSE-SU-2025:20769-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022672.html","summary":"SUSE Security Update SUSE-SU-2025:20770-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022651.html","summary":"SUSE Security Update SUSE-SU-2025:20790-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022682.html","summary":"SUSE Security Update SUSE-SU-2025:20724-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022681.html","summary":"SUSE Security Update SUSE-SU-2025:20725-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022683.html","summary":"SUSE Security Update SUSE-SU-2025:20722-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022691.html","summary":"SUSE Security Update SUSE-SU-2025:20727-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022671.html","summary":"SUSE Security Update SUSE-SU-2025:20772-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022689.html","summary":"SUSE Security Update SUSE-SU-2025:20723-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022665.html","summary":"SUSE Security Update SUSE-SU-2025:20778-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022668.html","summary":"SUSE Security Update SUSE-SU-2025:20774-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022699.html","summary":"SUSE Security Update SUSE-SU-2025:20734-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022697.html","summary":"SUSE Security Update SUSE-SU-2025:20738-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022669.html","summary":"SUSE Security Update SUSE-SU-2025:20771-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022698.html","summary":"SUSE Security Update SUSE-SU-2025:20733-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022664.html","summary":"SUSE Security Update SUSE-SU-2025:20779-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022667.html","summary":"SUSE Security Update SUSE-SU-2025:20775-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022694.html","summary":"SUSE Security Update SUSE-SU-2025:03374-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022663.html","summary":"SUSE Security Update SUSE-SU-2025:20780-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022692.html","summary":"SUSE Security Update SUSE-SU-2025:20726-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022693.html","summary":"SUSE Security Update SUSE-SU-2025:03375-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022644.html","summary":"SUSE Security Update SUSE-SU-2025:03362-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022643.html","summary":"SUSE Security Update SUSE-SU-2025:03363-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022662.html","summary":"SUSE Security Update SUSE-SU-2025:20781-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022656.html","summary":"SUSE Security Update SUSE-SU-2025:20782-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022711.html","summary":"SUSE Security Update SUSE-SU-2025:20739-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022710.html","summary":"SUSE Security Update SUSE-SU-2025:20731-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022709.html","summary":"SUSE Security Update SUSE-SU-2025:20735-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022657.html","summary":"SUSE Security Update SUSE-SU-2025:20777-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022723.html","summary":"SUSE Security Update SUSE-SU-2025:03384-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022703.html","summary":"SUSE Security Update SUSE-SU-2025:20756-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022658.html","summary":"SUSE Security Update SUSE-SU-2025:20763-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022676.html","summary":"SUSE Security Update SUSE-SU-2025:20767-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022642.html","summary":"SUSE Security Update SUSE-SU-2025:03370-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022659.html","summary":"SUSE Security Update SUSE-SU-2025:20762-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022721.html","summary":"SUSE Security Update SUSE-SU-2025:03382-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022655.html","summary":"SUSE Security Update SUSE-SU-2025:20785-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022660.html","summary":"SUSE Security Update SUSE-SU-2025:20787-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022720.html","summary":"SUSE Security Update SUSE-SU-2025:20730-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022718.html","summary":"SUSE Security Update SUSE-SU-2025:20737-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022654.html","summary":"SUSE Security Update SUSE-SU-2025:20786-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022715.html","summary":"SUSE Security Update SUSE-SU-2025:20761-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022714.html","summary":"SUSE Security Update SUSE-SU-2025:20729-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022652.html","summary":"SUSE Security Update SUSE-SU-2025:20789-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022713.html","summary":"SUSE Security Update SUSE-SU-2025:20784-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022722.html","summary":"SUSE Security Update SUSE-SU-2025:03381-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022737.html","summary":"SUSE Security Update SUSE-SU-2025:03400-1 vom 2025-09-29","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022744.html","summary":"SUSE Security Update SUSE-SU-2025:03389-1 vom 2025-09-29","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022726.html","summary":"SUSE Security Update SUSE-SU-2025:03418-1 vom 2025-09-29","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022740.html","summary":"SUSE Security Update SUSE-SU-2025:03393-1 vom 2025-09-29","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022729.html","summary":"SUSE Security Update SUSE-SU-2025:03414-1 vom 2025-09-29","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022730.html","summary":"SUSE Security Update SUSE-SU-2025:03412-1 vom 2025-09-29","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022733.html","summary":"SUSE Security Update SUSE-SU-2025:03410-1 vom 2025-09-29","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022742.html","summary":"SUSE Security Update SUSE-SU-2025:03387-1 vom 2025-09-29","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022725.html","summary":"SUSE Security Update SUSE-SU-2025:03419-1 vom 2025-09-29","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022732.html","summary":"SUSE Security Update SUSE-SU-2025:03406-1 vom 2025-09-29","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022734.html","summary":"SUSE Security Update SUSE-SU-2025:03408-1 vom 2025-09-29","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022743.html","summary":"SUSE Security Update SUSE-SU-2025:03391-1 vom 2025-09-29","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022739.html","summary":"SUSE Security Update SUSE-SU-2025:03395-1 vom 2025-09-29","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022738.html","summary":"SUSE Security Update SUSE-SU-2025:03396-1 vom 2025-09-29","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022736.html","summary":"SUSE Security Update SUSE-SU-2025:03397-1 vom 2025-09-29","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2025-091.html","summary":"Amazon Linux Security Advisory ALAS2KERNEL-5.15-2025-091 vom 2025-09-30","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:17122","summary":"Red Hat Security Advisory RHSA-2025:17122 vom 2025-10-01","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:17109","summary":"Red Hat Security Advisory RHSA-2025:17109 vom 2025-09-30","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:17123","summary":"Red Hat Security Advisory RHSA-2025:17123 vom 2025-10-01","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:17124","summary":"Red Hat Security Advisory RHSA-2025:17124 vom 2025-10-01","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7775-3","summary":"Ubuntu Security Notice USN-7775-3 vom 2025-10-01","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:17192","summary":"Red Hat Security Advisory RHSA-2025:17192 vom 2025-10-01","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7774-4","summary":"Ubuntu Security Notice USN-7774-4 vom 2025-10-01","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:17159","summary":"Red Hat Security Advisory RHSA-2025:17159 vom 2025-10-01","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:17161","summary":"Red Hat Security Advisory RHSA-2025:17161 vom 2025-10-01","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:17241","summary":"Red Hat Security Advisory RHSA-2025:17241 vom 2025-10-02","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7774-5","summary":"Ubuntu Security Notice USN-7774-5 vom 2025-10-06","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:17570","summary":"Red Hat Security Advisory RHSA-2025:17570 vom 2025-10-08","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2025:15011","summary":"Rocky Linux Security Advisory RLSA-2025:15011 vom 2025-10-10","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html","summary":"Debian Security Advisory DLA-4327 vom 2025-10-13","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html","summary":"Debian Security Advisory DLA-4328 vom 2025-10-13","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-20663.html","summary":"Oracle Linux Security Advisory ELSA-2025-20663 vom 2025-10-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:18043","summary":"Red Hat Security Advisory RHSA-2025:18043 vom 2025-10-15","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:18054","summary":"Red Hat Security Advisory RHSA-2025:18054 vom 2025-10-15","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-20662.html","summary":"Oracle Linux Security Advisory ELSA-2025-20662 vom 2025-10-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/022903.html","summary":"SUSE Security Update SUSE-SU-2025:03601-1 vom 2025-10-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html","summary":"SUSE Security Update SUSE-SU-2025:03613-1 vom 2025-10-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/022908.html","summary":"SUSE Security Update SUSE-SU-2025:03602-1 vom 2025-10-15","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:18098","summary":"Red Hat Security Advisory RHSA-2025:18098 vom 2025-10-15","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VHWHH7ZSMFJ6PQZ3CBDGGCWHNBCWD26Z/","summary":"SUSE Security Update SUSE-SU-2025:03600-1 vom 2025-10-15","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z3DYHRRLY43MYRNEEU5SFR4ZRMSPITED/","summary":"SUSE Security Update SUSE-SU-2025:03626-1 vom 2025-10-17","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O6BEPQBC4GULLYP5G3VVU4ZS37B7I6EV/","summary":"SUSE Security Update SUSE-SU-2025:03628-1 vom 2025-10-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html","summary":"SUSE Security Update SUSE-SU-2025:03633-1 vom 2025-10-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/022925.html","summary":"SUSE Security Update SUSE-SU-2025:03634-1 vom 2025-10-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/022941.html","summary":"SUSE Security Update SUSE-SU-2025:03650-1 vom 2025-10-20","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/022939.html","summary":"SUSE Security Update SUSE-SU-2025:03646-1 vom 2025-10-20","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/022942.html","summary":"SUSE Security Update SUSE-SU-2025:03638-1 vom 2025-10-20","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R2ZDQ56FB6HP3MW5EA7XPTYNW5AUJ3AO/","summary":"SUSE Security Update SUSE-SU-2025:03666-1 vom 2025-10-20","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/022929.html","summary":"SUSE Security Update SUSE-SU-2025:03671-1 vom 2025-10-20","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NIBX7WDZXXXRTIUDX7WFS3VGPWD7NNCX/","summary":"SUSE Security Update SUSE-SU-2025:03663-1 vom 2025-10-20","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NSB4TMSU4TOG6COW7K5C7QOAGBVGEEO2/","summary":"SUSE Security Update SUSE-SU-2025:03671-1 vom 2025-10-20","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2MTOFMRK3LB5Y4CTKRSRIRDTSJXMBKZB/","summary":"SUSE Security Update SUSE-SU-2025:03664-1 vom 2025-10-20","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NBPUS7ADLARNQVEORNQNHAKFYFPWDZPM/","summary":"SUSE Security Update SUSE-SU-2025:03672-1 vom 2025-10-20","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/022943.html","summary":"SUSE Security Update SUSE-SU-2025:03636-1 vom 2025-10-20","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XTWL6L2BIOYRPPMWBKKXRSQCWTVL6MBK/","summary":"SUSE Security Update SUSE-SU-2025:3683-1 vom 2025-10-20","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZNHGGK5KFH4OCT6BUZCQ23FN6LMQEJ7V/","summary":"SUSE Security Update SUSE-SU-2025:3679-1 vom 2025-10-20","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEX3OIACWJNL3JFTCKTDDY2ZAAD3HXJ5/","summary":"SUSE Security Update SUSE-SU-2025:3675-1 vom 2025-10-20","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-17161.html","summary":"Oracle Linux Security Advisory ELSA-2025-17161 vom 2025-10-21","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7834-1","summary":"Ubuntu Security Notice USN-7834-1 vom 2025-10-22","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H42YWEJO27NI2QHNED4NU6MIZAXTRDPY/","summary":"SUSE Security Update SUSE-SU-2025:3704-1 vom 2025-10-21","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7833-1","summary":"Ubuntu Security Notice USN-7833-1 vom 2025-10-22","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2C3GDA2UXZMXIQAO2JMJJII7QMPM54ZZ/","summary":"SUSE Security Update SUSE-SU-2025:3705-1 vom 2025-10-21","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FZYWNRYWXLEJETDZ2TBJ7OQN7FAFP4Y6/","summary":"SUSE Security Update SUSE-SU-2025:3712-1 vom 2025-10-22","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html","summary":"SUSE Security Update SUSE-SU-2025:3716-1 vom 2025-10-22","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R6QLOEOUP77I4M7UKXCNO7CMNS47EZCS/","summary":"SUSE Security Update SUSE-SU-2025:3717-1 vom 2025-10-22","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L3TCWIIDVGY2LQ4RGEKREUVE35SBN3NV/","summary":"SUSE Security Update SUSE-SU-2025:3731-1 vom 2025-10-22","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UN435YQKTHGRJUJEQKONJDZNHE66V4AU/","summary":"SUSE Security Update SUSE-SU-2025:3733-1 vom 2025-10-22","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2ZXX3UCU5EV627AL7XTBESRPRFGBRMAK/","summary":"SUSE Security Update SUSE-SU-2025:3721-1 vom 2025-10-22","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F3TOUYNINXLB53MUMC4YBDKDZIK7DGUF/","summary":"SUSE Security Update SUSE-SU-2025:3734-1 vom 2025-10-22","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/022975.html","summary":"SUSE Security Update SUSE-SU-2025:3742-1 vom 2025-10-23","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R47XI57K3GXZNN6FG7VTOGIXG2ZUYHVY/","summary":"SUSE Security Update SUSE-SU-2025:3736-1 vom 2025-10-23","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V7WMM33D7UTTQM25T2XCVZHFJKIMM3TO/","summary":"SUSE Security Update SUSE-SU-2025:3742-1 vom 2025-10-23","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NMB6RXALFYMRMM4UK7R54RAQRCZJEBH4/","summary":"SUSE Security Update SUSE-SU-2025:3751-1 vom 2025-10-23","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SP6KY7ONJTFGDWCHVV7CO7D4KUEJ27DA/","summary":"SUSE Security Update SUSE-SU-2025:3764-1 vom 2025-10-23","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L5PU3QBFUI54V4YM7FX4AIWKDVDLIFMV/","summary":"SUSE Security Update SUSE-SU-2025:3762-1 vom 2025-10-23","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BYXC2NBEEGHSFXWCA3DVT5LVZMZ5RRNP/","summary":"SUSE Security Update SUSE-SU-2025:3748-1 vom 2025-10-23","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZFR7CE7W5U4CT7EDERPCHLWSGEIHWJLA/","summary":"SUSE Security Update SUSE-SU-2025:3755-1 vom 2025-10-23","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/022991.html","summary":"SUSE Security Update SUSE-SU-2025:3765-1 vom 2025-10-23","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JX5Y5NWCULMT7SH5C6ZUDMMTVZPLLOJC/","summary":"SUSE Security Update SUSE-SU-2025:3768-1 vom 2025-10-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/022994.html","summary":"SUSE Security Update SUSE-SU-2025:3772-1 vom 2025-10-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/022995.html","summary":"SUSE Security Update SUSE-SU-2025:3771-1 vom 2025-10-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023019.html","summary":"SUSE Security Update SUSE-SU-2025:20861-1 vom 2025-10-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html","summary":"SUSE Security Update SUSE-SU-2025:20851-1 vom 2025-10-24","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7833-3","summary":"Ubuntu Security Notice USN-7833-3 vom 2025-10-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023040.html","summary":"SUSE Security Update SUSE-SU-2025:20890-1 vom 2025-10-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023044.html","summary":"SUSE Security Update SUSE-SU-2025:20886-1 vom 2025-10-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023045.html","summary":"SUSE Security Update SUSE-SU-2025:20885-1 vom 2025-10-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023042.html","summary":"SUSE Security Update SUSE-SU-2025:20888-1 vom 2025-10-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023047.html","summary":"SUSE Security Update SUSE-SU-2025:20883-1 vom 2025-10-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023046.html","summary":"SUSE Security Update SUSE-SU-2025:20884-1 vom 2025-10-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023048.html","summary":"SUSE Security Update SUSE-SU-2025:20882-1 vom 2025-10-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023043.html","summary":"SUSE Security Update SUSE-SU-2025:20887-1 vom 2025-10-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023049.html","summary":"SUSE Security Update SUSE-SU-2025:20881-1 vom 2025-10-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023039.html","summary":"SUSE Security Update SUSE-SU-2025:20891-1 vom 2025-10-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023051.html","summary":"SUSE Security Update SUSE-SU-2025:20879-1 vom 2025-10-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023052.html","summary":"SUSE Security Update SUSE-SU-2025:20878-1 vom 2025-10-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023053.html","summary":"SUSE Security Update SUSE-SU-2025:20877-1 vom 2025-10-27","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2025-107.html","summary":"Amazon Linux Security Advisory ALAS2KERNEL-5.10-2025-107 vom 2025-10-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023054.html","summary":"SUSE Security Update SUSE-SU-2025:20876-1 vom 2025-10-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023055.html","summary":"SUSE Security Update SUSE-SU-2025:20875-1 vom 2025-10-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023056.html","summary":"SUSE Security Update SUSE-SU-2025:20874-1 vom 2025-10-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023057.html","summary":"SUSE Security Update SUSE-SU-2025:20873-1 vom 2025-10-27","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7249276","summary":"IBM Security Bulletin 7249276 vom 2025-10-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html","summary":"SUSE Security Update SUSE-SU-2025:20870-1 vom 2025-10-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023109.html","summary":"SUSE Security Update SUSE-SU-2025:20906-1 vom 2025-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023113.html","summary":"SUSE Security Update SUSE-SU-2025:20902-1 vom 2025-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023101.html","summary":"SUSE Security Update SUSE-SU-2025:20914-1 vom 2025-10-30","category":"external"},{"url":"https://www.dell.com/support/kbdoc/000385435","summary":"Dell Security Advisory DSA-2025-404 vom 2025-10-31","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html","summary":"SUSE Security Update SUSE-SU-2025:20898-1 vom 2025-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023097.html","summary":"SUSE Security Update SUSE-SU-2025:20918-1 vom 2025-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023111.html","summary":"SUSE Security Update SUSE-SU-2025:20904-1 vom 2025-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023103.html","summary":"SUSE Security Update SUSE-SU-2025:20912-1 vom 2025-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023106.html","summary":"SUSE Security Update SUSE-SU-2025:20909-1 vom 2025-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023108.html","summary":"SUSE Security Update SUSE-SU-2025:20907-1 vom 2025-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023095.html","summary":"SUSE Security Update SUSE-SU-2025:20920-1 vom 2025-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023098.html","summary":"SUSE Security Update SUSE-SU-2025:20917-1 vom 2025-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023110.html","summary":"SUSE Security Update SUSE-SU-2025:20905-1 vom 2025-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023112.html","summary":"SUSE Security Update SUSE-SU-2025:20903-1 vom 2025-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023102.html","summary":"SUSE Security Update SUSE-SU-2025:20913-1 vom 2025-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023099.html","summary":"SUSE Security Update SUSE-SU-2025:20916-1 vom 2025-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023100.html","summary":"SUSE Security Update SUSE-SU-2025:20915-1 vom 2025-10-30","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7833-4","summary":"Ubuntu Security Notice USN-7833-4 vom 2025-10-31","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-November/023146.html","summary":"SUSE Security Update SUSE-SU-2025:2588-1 vom 2025-11-04","category":"external"},{"url":"https://www.dell.com/support/kbdoc/000385230","summary":"Dell Security Advisory DSA-2025-390 vom 2025-11-05","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7856-1","summary":"Ubuntu Security Notice USN-7856-1 vom 2025-11-04","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-25757.html","summary":"Oracle Linux Security Advisory ELSA-2025-25757 vom 2025-11-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html","summary":"SUSE Security Update SUSE-SU-2025:20996-1 vom 2025-11-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html","summary":"SUSE Security Update SUSE-SU-2025:20994-1 vom 2025-11-12","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:21667","summary":"Red Hat Security Advisory RHSA-2025:21667 vom 2025-11-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html","summary":"SUSE Security Update SUSE-SU-2025:4123-1 vom 2025-11-18","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J4KLZE7HUQJ2N6IQEI3G2KJZ5VB36YBI/","summary":"openSUSE Security Update OPENSUSE-SU-2025-20081-1 vom 2025-11-26","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7889-2","summary":"Ubuntu Security Notice USN-7889-2 vom 2025-11-26","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7889-1","summary":"Ubuntu Security Notice USN-7889-1 vom 2025-11-25","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7889-3","summary":"Ubuntu Security Notice USN-7889-3 vom 2025-11-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html","summary":"SUSE Security Update SUSE-SU-2025:21074-1 vom 2025-11-28","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7889-4","summary":"Ubuntu Security Notice USN-7889-4 vom 2025-12-04","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:22752","summary":"Red Hat Security Advisory RHSA-2025:22752 vom 2025-12-04","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7889-5","summary":"Ubuntu Security Notice USN-7889-5 vom 2025-12-05","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html","summary":"SUSE Security Update SUSE-SU-2025:21179-1 vom 2025-12-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html","summary":"SUSE Security Update SUSE-SU-2025:21139-1 vom 2025-12-10","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7889-6","summary":"Ubuntu Security Notice USN-7889-6 vom 2025-12-11","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-28049.html","summary":"Oracle Linux Security Advisory ELSA-2025-28049 vom 2025-12-15","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7935-1","summary":"Ubuntu Security Notice USN-7935-1 vom 2025-12-16","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-21063.html","summary":"Oracle Linux Security Advisory ELSA-2025-21063 vom 2025-12-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7889-7","summary":"Ubuntu Security Notice USN-7889-7 vom 2025-12-16","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7940-1","summary":"Ubuntu Security Notice USN-7940-1 vom 2025-12-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7940-2","summary":"Ubuntu Security Notice USN-7940-2 vom 2026-01-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-January/023804.html","summary":"SUSE Security Update SUSE-SU-2026:0170-1 vom 2026-01-20","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-22910.html","summary":"Oracle Linux Security Advisory ELSA-2025-22910 vom 2026-01-29","category":"external"},{"url":"https://www.dell.com/support/kbdoc/de-de/000421570/dsa-2026-030-security-update-for-dell-networker-vproxy-multiple-third-party-component-vulnerabilities","summary":"Dell Security Advisory DSA-2026-030 vom 2026-01-30","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-23947.html","summary":"Oracle Linux Security Advisory ELSA-2025-23947 vom 2026-01-30","category":"external"},{"url":"https://lists.debian.org/debian-security-announce/2026/msg00036.html","summary":"Debian Security Advisory DSA-6127 vom 2026-02-10","category":"external"},{"url":"https://lists.debian.org/debian-security-announce/2026/msg00035.html","summary":"Debian Security Advisory DSA-6126 vom 2026-02-09","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2026/02/msg00017.html","summary":"Debian Security Advisory DLA-4476 vom 2026-02-11","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8028-1","summary":"Ubuntu Security Notice USN-8028-1 vom 2026-02-11","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8031-1","summary":"Ubuntu Security Notice USN-8031-1 vom 2026-02-12","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8028-2","summary":"Ubuntu Security Notice USN-8028-2 vom 2026-02-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html","summary":"SUSE Security Update SUSE-SU-2026:0472-1 vom 2026-02-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html","summary":"SUSE Security Update SUSE-SU-2026:20330-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html","summary":"SUSE Security Update SUSE-SU-2026:20310-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html","summary":"SUSE Security Update SUSE-SU-2026:20309-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html","summary":"SUSE Security Update SUSE-SU-2026:20316-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html","summary":"SUSE Security Update SUSE-SU-2026:20332-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html","summary":"SUSE Security Update SUSE-SU-2026:20331-1 vom 2026-02-13","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8028-3","summary":"Ubuntu Security Notice USN-8028-3 vom 2026-02-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8028-5","summary":"Ubuntu Security Notice USN-8028-5 vom 2026-02-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8028-4","summary":"Ubuntu Security Notice USN-8028-4 vom 2026-02-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8031-2","summary":"Ubuntu Security Notice USN-8031-2 vom 2026-02-18","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8052-1","summary":"Ubuntu Security Notice USN-8052-1 vom 2026-02-19","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8031-3","summary":"Ubuntu Security Notice USN-8031-3 vom 2026-02-19","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-0755.html","summary":"Oracle Linux Security Advisory ELSA-2026-0755 vom 2026-02-18","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8028-7","summary":"Ubuntu Security Notice USN-8028-7 vom 2026-02-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html","summary":"SUSE Security Update SUSE-SU-2026:0587-1 vom 2026-02-20","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3066","summary":"Red Hat Security Advisory RHSA-2026:3066 vom 2026-02-23","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-50112.html","summary":"Oracle Linux Security Advisory ELSA-2026-50112 vom 2026-02-23","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8028-8","summary":"Ubuntu Security Notice USN-8028-8 vom 2026-02-24","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8052-2","summary":"Ubuntu Security Notice USN-8052-2 vom 2026-02-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3275","summary":"Red Hat Security Advisory RHSA-2026:3275 vom 2026-02-25","category":"external"},{"url":"http://linux.oracle.com/errata/ELSA-2026-3066.html","summary":"Oracle Linux Security Advisory ELSA-2026-3066 vom 2026-02-25","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-3066.html","summary":"Oracle Linux Security Advisory ELSA-2026-3066 vom 2026-02-25","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-3275.html","summary":"Oracle Linux Security Advisory ELSA-2026-3275 vom 2026-02-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024506.html","summary":"SUSE Security Update SUSE-SU-2026:0688-1 vom 2026-02-28","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-1581.html","summary":"Oracle Linux Security Advisory ELSA-2026-1581 vom 2026-03-04","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8074-1","summary":"Ubuntu Security Notice USN-8074-1 vom 2026-03-04","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8074-2","summary":"Ubuntu Security Notice USN-8074-2 vom 2026-03-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html","summary":"SUSE Security Update SUSE-SU-2026:20560-1 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4246","summary":"Red Hat Security Advisory RHSA-2026:4246 vom 2026-03-11","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-50145.html","summary":"Oracle Linux Security Advisory ELSA-2026-50145 vom 2026-03-12","category":"external"},{"url":"https://lists.debian.org/debian-security-announce/2026/msg00071.html","summary":"Debian Security Advisory DSA-6163 vom 2026-03-13","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2026/03/msg00002.html","summary":"Debian Security Advisory DLA-4498 vom 2026-03-13","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2026/03/msg00003.html","summary":"Debian Security Advisory DLA-4499 vom 2026-03-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4745","summary":"Red Hat Security Advisory RHSA-2026:4745 vom 2026-03-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024762.html","summary":"SUSE Security Update SUSE-SU-2026:0928-1 vom 2026-03-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024805.html","summary":"SUSE Security Update SUSE-SU-2026:0961-1 vom 2026-03-23","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-3685.html","summary":"Oracle Linux Security Advisory ELSA-2026-3685 vom 2026-03-25","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8126-1","summary":"Ubuntu Security Notice USN-8126-1 vom 2026-03-25","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6037","summary":"Red Hat Security Advisory RHSA-2026:6037 vom 2026-03-30","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6036","summary":"Red Hat Security Advisory RHSA-2026:6036 vom 2026-03-30","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6153","summary":"Red Hat Security Advisory RHSA-2026:6153 vom 2026-03-30","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6310","summary":"Red Hat Security Advisory RHSA-2026:6310 vom 2026-04-01","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-6037.html","summary":"Oracle Linux Security Advisory ELSA-2026-6037 vom 2026-04-01","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-6153.html","summary":"Oracle Linux Security Advisory ELSA-2026-6153 vom 2026-04-01","category":"external"},{"url":"https://oss.oracle.com/pipermail/el-errata/2026-March/020110.html","summary":"Oracle Linux Security Advisory ELSA-2026-50171 vom 2026-03-31","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:6036","summary":"Rocky Linux Security Advisory RLSA-2026:6036 vom 2026-04-07","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:6037","summary":"Rocky Linux Security Advisory RLSA-2026:6037 vom 2026-04-07","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6940","summary":"Red Hat Security Advisory RHSA-2026:6940 vom 2026-04-08","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6948","summary":"Red Hat Security Advisory RHSA-2026:6948 vom 2026-04-08","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6954","summary":"Red Hat Security Advisory RHSA-2026:6954 vom 2026-04-08","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6986","summary":"Red Hat Security Advisory RHSA-2026:6986 vom 2026-04-08","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6953","summary":"Red Hat Security Advisory RHSA-2026:6953 vom 2026-04-08","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:6153","summary":"Rocky Linux Security Advisory RLSA-2026:6153 vom 2026-04-08","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6961","summary":"Red Hat Security Advisory RHSA-2026:6961 vom 2026-04-08","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:7003","summary":"Red Hat Security Advisory RHSA-2026:7003 vom 2026-04-08","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:7100","summary":"Red Hat Security Advisory RHSA-2026:7100 vom 2026-04-08","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:7013","summary":"Red Hat Security Advisory RHSA-2026:7013 vom 2026-04-08","category":"external"}],"severity":"high","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://lore.kernel.org/linux-cve-announce/","published":"2025-07-06","updated":"2026-04-08","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-09T09:00:51.479Z","sourceUrl":"https://lore.kernel.org/linux-cve-announce/","added":"2026-04-08T00:00:00.000Z","public_url":"https://lore.kernel.org/linux-cve-announce/","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-w-2025-1465 cve-2025-38177 linux kernel: mehrere schwachstellen ermöglichen denial of service bsi bsi","public_published":"2025-07-06","public_updated":"2026-04-08","public_display_date":"2026-04-08","public_sort_date":"2026-04-08","public_period_date":"2026-04-08"},{"id":"BSI:WID-SEC-W-2025-1517","cve":"CVE-2025-38238","title":"Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2025-07-08","published":"2025-07-08","updated":"2026-04-08","source_published":"2025-07-08","source_updated":"2026-04-08","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://lore.kernel.org/linux-cve-announce/","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1517.json","summary":"WID-SEC-W-2025-1517 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1517","summary":"WID-SEC-2025-1517 - Portal Version","category":"self"},{"url":"https://lore.kernel.org/linux-cve-announce/","summary":"Kernel CVE Announce Mailingliste","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070930-CVE-2025-38238-dae2@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38238","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070933-CVE-2025-38241-a50c@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38241","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070933-CVE-2025-38242-8f85@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38242","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070933-CVE-2025-38243-4b56@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38243","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070933-CVE-2025-38244-6c2c@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38244","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070933-CVE-2025-38245-a430@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38245","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070934-CVE-2025-38246-2386@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38246","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070934-CVE-2025-38247-14ac@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38247","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070934-CVE-2025-38248-003c@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38248","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070934-CVE-2025-38249-a6a3@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38249","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070934-CVE-2025-38250-3145@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38250","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070934-CVE-2025-38251-3894@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38251","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070935-CVE-2025-38252-41d6@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38252","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070935-CVE-2025-38253-a33e@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38253","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070935-CVE-2025-38254-7416@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38254","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070935-CVE-2025-38255-57aa@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38255","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070935-CVE-2025-38256-01cc@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38256","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070935-CVE-2025-38257-3e5d@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38257","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070936-CVE-2025-38258-4e00@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38258","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070936-CVE-2025-38259-a05a@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38259","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070936-CVE-2025-38260-c8c1@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38260","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070936-CVE-2025-38261-54c0@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38261","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070936-CVE-2025-38262-419f@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38262","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070937-CVE-2025-38263-cc93@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38263","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2025070937-CVE-2025-38264-ffd2@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2025-38264","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VQYPF6FAXKWBHQ4POBUPZVPW4L73XJR5/","summary":"SUSE Security Update SUSE-SU-2025:02588-1 vom 2025-08-01","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:12662","summary":"Red Hat Security Advisory RHSA-2025:12662 vom 2025-08-04","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-12662.html","summary":"Oracle Linux Security Advisory ELSA-2025-12662 vom 2025-08-11","category":"external"},{"url":"https://lists.debian.org/debian-security-announce/2025/msg00137.html","summary":"Debian Security Advisory DSA-5973 vom 2025-08-12","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:13960","summary":"Red Hat Security Advisory RHSA-2025:13960 vom 2025-08-18","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:13961","summary":"Red Hat Security Advisory RHSA-2025:13961 vom 2025-08-18","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:13962","summary":"Red Hat Security Advisory RHSA-2025:13962 vom 2025-08-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022202.html","summary":"SUSE Security Update SUSE-SU-2025:02851-1 vom 2025-08-18","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:14009","summary":"Red Hat Security Advisory RHSA-2025:14009 vom 2025-08-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022192.html","summary":"SUSE Security Update SUSE-SU-2025:02846-1 vom 2025-08-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022203.html","summary":"SUSE Security Update SUSE-SU-2025:02850-1 vom 2025-08-18","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-13960.html","summary":"Oracle Linux Security Advisory ELSA-2025-13960 vom 2025-08-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022193.html","summary":"SUSE Security Update SUSE-SU-2025:02848-1 vom 2025-08-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022200.html","summary":"SUSE Security Update SUSE-SU-2025:02853-1 vom 2025-08-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022201.html","summary":"SUSE Security Update SUSE-SU-2025:02852-1 vom 2025-08-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022204.html","summary":"SUSE Security Update SUSE-SU-2025:02849-1 vom 2025-08-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022237.html","summary":"SUSE Security Update SUSE-SU-2025:02923-1 vom 2025-08-20","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-13962.html","summary":"Oracle Linux Security Advisory ELSA-2025-13962 vom 2025-08-20","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-14009.html","summary":"Oracle Linux Security Advisory ELSA-2025-14009 vom 2025-08-22","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022259.html","summary":"SUSE Security Update SUSE-SU-2025:02969-1 vom 2025-08-25","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:14692","summary":"Red Hat Security Advisory RHSA-2025:14692 vom 2025-08-27","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:14742","summary":"Red Hat vom 2025-08-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022283.html","summary":"SUSE Security Update SUSE-SU-2025:02997-1 vom 2025-08-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html","summary":"SUSE Security Update SUSE-SU-2025:02996-1 vom 2025-08-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html","summary":"SUSE Security Update SUSE-SU-2025:20577-1 vom 2025-08-28","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022295.html","summary":"SUSE Security Update SUSE-SU-2025:20586-1 vom 2025-08-28","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022327.html","summary":"SUSE Security Update SUSE-SU-2025:03011-1 vom 2025-08-28","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022329.html","summary":"SUSE Security Update SUSE-SU-2025:03023-1 vom 2025-08-29","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html","summary":"SUSE Security Update SUSE-SU-2025:20601-1 vom 2025-08-29","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022362.html","summary":"SUSE Security Update SUSE-SU-2025:20602-1 vom 2025-08-29","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:14985","summary":"Red Hat Security Advisory RHSA-2025:14985 vom 2025-09-02","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:15035","summary":"Red Hat Security Advisory RHSA-2025:15035 vom 2025-09-02","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:15227","summary":"Red Hat Security Advisory RHSA-2025:15227 vom 2025-09-04","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:15224","summary":"Red Hat Security Advisory RHSA-2025:15224 vom 2025-09-04","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-20551.html","summary":"Oracle Linux Security Advisory ELSA-2025-20551 vom 2025-09-09","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-20552.html","summary":"Oracle Linux Security Advisory ELSA-2025-20552 vom 2025-09-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022432.html","summary":"SUSE Security Update SUSE-SU-2025:20653-1 vom 2025-09-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:15670","summary":"Red Hat Security Advisory RHSA-2025:15670 vom 2025-09-11","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:15668","summary":"Red Hat Security Advisory RHSA-2025:15668 vom 2025-09-11","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:15658","summary":"Red Hat Security Advisory RHSA-2025:15658 vom 2025-09-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html","summary":"SUSE Security Update SUSE-SU-2025:20669-1 vom 2025-09-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022522.html","summary":"SUSE Security Update SUSE-SU-2025:03204-1 vom 2025-09-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022602.html","summary":"SUSE Security Update SUSE-SU-2025:03290-1 vom 2025-09-22","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-20609.html","summary":"Oracle Linux Security Advisory ELSA-2025-20609 vom 2025-09-23","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022605.html","summary":"SUSE Security Update SUSE-SU-2025:03301-1 vom 2025-09-23","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7774-1","summary":"Ubuntu Security Notice USN-7774-1 vom 2025-09-25","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7774-3","summary":"Ubuntu Security Notice USN-7774-3 vom 2025-09-25","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7774-2","summary":"Ubuntu Security Notice USN-7774-2 vom 2025-09-25","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7776-1","summary":"Ubuntu Security Notice USN-7776-1 vom 2025-09-25","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7775-1","summary":"Ubuntu Security Notice USN-7775-1 vom 2025-09-25","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7775-2","summary":"Ubuntu Security Notice USN-7775-2 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022703.html","summary":"SUSE Security Update SUSE-SU-2025:20756-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022721.html","summary":"SUSE Security Update SUSE-SU-2025:03382-1 vom 2025-09-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-September/022711.html","summary":"SUSE Security Update SUSE-SU-2025:20739-1 vom 2025-09-26","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7775-3","summary":"Ubuntu Security Notice USN-7775-3 vom 2025-10-01","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7774-4","summary":"Ubuntu Security Notice USN-7774-4 vom 2025-10-01","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7774-5","summary":"Ubuntu Security Notice USN-7774-5 vom 2025-10-06","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7808-1","summary":"Ubuntu Security Notice USN-7808-1 vom 2025-10-08","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7809-1","summary":"Ubuntu Security Notice USN-7809-1 vom 2025-10-08","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html","summary":"Debian Security Advisory DLA-4328 vom 2025-10-13","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html","summary":"Debian Security Advisory DLA-4327 vom 2025-10-13","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-20663.html","summary":"Oracle Linux Security Advisory ELSA-2025-20663 vom 2025-10-13","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7808-2","summary":"Ubuntu Security Notice USN-7808-2 vom 2025-10-14","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-20716.html","summary":"Oracle Linux Security Advisory ELSA-2025-20716 vom 2025-10-15","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VHWHH7ZSMFJ6PQZ3CBDGGCWHNBCWD26Z/","summary":"SUSE Security Update SUSE-SU-2025:03600-1 vom 2025-10-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/022908.html","summary":"SUSE Security Update SUSE-SU-2025:03602-1 vom 2025-10-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/022903.html","summary":"SUSE Security Update SUSE-SU-2025:03601-1 vom 2025-10-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html","summary":"SUSE Security Update SUSE-SU-2025:03633-1 vom 2025-10-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/022925.html","summary":"SUSE Security Update SUSE-SU-2025:03634-1 vom 2025-10-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7834-1","summary":"Ubuntu Security Notice USN-7834-1 vom 2025-10-22","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7833-1","summary":"Ubuntu Security Notice USN-7833-1 vom 2025-10-22","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NMB6RXALFYMRMM4UK7R54RAQRCZJEBH4/","summary":"SUSE Security Update SUSE-SU-2025:3751-1 vom 2025-10-23","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html","summary":"SUSE Security Update SUSE-SU-2025:20851-1 vom 2025-10-24","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7833-3","summary":"Ubuntu Security Notice USN-7833-3 vom 2025-10-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023019.html","summary":"SUSE Security Update SUSE-SU-2025:20861-1 vom 2025-10-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html","summary":"SUSE Security Update SUSE-SU-2025:20870-1 vom 2025-10-27","category":"external"},{"url":"https://www.dell.com/support/kbdoc/000385435","summary":"Dell Security Advisory DSA-2025-404 vom 2025-10-31","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html","summary":"SUSE Security Update SUSE-SU-2025:20898-1 vom 2025-10-30","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7833-4","summary":"Ubuntu Security Notice USN-7833-4 vom 2025-10-31","category":"external"},{"url":"https://www.dell.com/support/kbdoc/000385230","summary":"Dell Security Advisory DSA-2025-390 vom 2025-11-05","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7856-1","summary":"Ubuntu Security Notice USN-7856-1 vom 2025-11-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-November/023146.html","summary":"SUSE Security Update SUSE-SU-2025:2588-1 vom 2025-11-04","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-19447.html","summary":"Oracle Linux Security Advisory ELSA-2025-19447 vom 2025-11-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html","summary":"SUSE Security Update SUSE-SU-2025:20996-1 vom 2025-11-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html","summary":"SUSE Security Update SUSE-SU-2025:20994-1 vom 2025-11-12","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J4KLZE7HUQJ2N6IQEI3G2KJZ5VB36YBI/","summary":"openSUSE Security Update OPENSUSE-SU-2025-20081-1 vom 2025-11-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html","summary":"SUSE Security Update SUSE-SU-2025:21074-1 vom 2025-11-28","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html","summary":"SUSE Security Update SUSE-SU-2025:21139-1 vom 2025-12-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html","summary":"SUSE Security Update SUSE-SU-2025:21179-1 vom 2025-12-10","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-28049.html","summary":"Oracle Linux Security Advisory ELSA-2025-28049 vom 2025-12-15","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AB6KSKMTVBQ3LXFYFQPSX2FP5YXKGUJ3/","summary":"SUSE Security Update SUSE-SU-2026:0090-1 vom 2026-01-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-January/023732.html","summary":"SUSE Security Update SUSE-SU-2026:0090-1 vom 2026-01-12","category":"external"},{"url":"https://security.netapp.com/advisory/NTAP-20260121-0003","summary":"NetApp Security Advisory NTAP-20260121-0003 vom 2026-01-21","category":"external"},{"url":"https://www.dell.com/support/kbdoc/de-de/000421570/dsa-2026-030-security-update-for-dell-networker-vproxy-multiple-third-party-component-vulnerabilities","summary":"Dell Security Advisory DSA-2026-030 vom 2026-01-30","category":"external"},{"url":"https://lists.debian.org/debian-security-announce/2026/msg00035.html","summary":"Debian Security Advisory DSA-6126 vom 2026-02-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html","summary":"SUSE Security Update SUSE-SU-2026:0447-1 vom 2026-02-11","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8028-1","summary":"Ubuntu Security Notice USN-8028-1 vom 2026-02-11","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8031-1","summary":"Ubuntu Security Notice USN-8031-1 vom 2026-02-12","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8033-3","summary":"Ubuntu Security Notice USN-8033-3 vom 2026-02-12","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8033-2","summary":"Ubuntu Security Notice USN-8033-2 vom 2026-02-12","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8028-2","summary":"Ubuntu Security Notice USN-8028-2 vom 2026-02-12","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8034-1","summary":"Ubuntu Security Notice USN-8034-1 vom 2026-02-12","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8033-1","summary":"Ubuntu Security Notice USN-8033-1 vom 2026-02-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html","summary":"SUSE Security Update SUSE-SU-2026:0472-1 vom 2026-02-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html","summary":"SUSE Security Update SUSE-SU-2026:0471-1 vom 2026-02-12","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8033-4","summary":"Ubuntu Security Notice USN-8033-4 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html","summary":"SUSE Security Update SUSE-SU-2026:20330-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html","summary":"SUSE Security Update SUSE-SU-2026:20331-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html","summary":"SUSE Security Update SUSE-SU-2026:20332-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html","summary":"SUSE Security Update SUSE-SU-2026:20316-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html","summary":"SUSE Security Update SUSE-SU-2026:20309-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html","summary":"SUSE Security Update SUSE-SU-2026:20310-1 vom 2026-02-13","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8028-5","summary":"Ubuntu Security Notice USN-8028-5 vom 2026-02-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8028-4","summary":"Ubuntu Security Notice USN-8028-4 vom 2026-02-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8028-3","summary":"Ubuntu Security Notice USN-8028-3 vom 2026-02-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8034-2","summary":"Ubuntu Security Notice USN-8034-2 vom 2026-02-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8033-6","summary":"Ubuntu Security Notice USN-8033-6 vom 2026-02-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8033-5","summary":"Ubuntu Security Notice USN-8033-5 vom 2026-02-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8031-2","summary":"Ubuntu Security Notice USN-8031-2 vom 2026-02-18","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8052-1","summary":"Ubuntu Security Notice USN-8052-1 vom 2026-02-19","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8028-6","summary":"Ubuntu Security Notice USN-8028-6 vom 2026-02-19","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8033-7","summary":"Ubuntu Security Notice USN-8033-7 vom 2026-02-19","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8031-3","summary":"Ubuntu Security Notice USN-8031-3 vom 2026-02-19","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8033-8","summary":"Ubuntu Security Notice USN-8033-8 vom 2026-02-19","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8028-7","summary":"Ubuntu Security Notice USN-8028-7 vom 2026-02-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html","summary":"SUSE Security Update SUSE-SU-2026:0587-1 vom 2026-02-20","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3083","summary":"Red Hat Security Advisory RHSA-2026:3083 vom 2026-02-23","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3110","summary":"Red Hat Security Advisory RHSA-2026:3110 vom 2026-02-23","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8052-2","summary":"Ubuntu Security Notice USN-8052-2 vom 2026-02-24","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8028-8","summary":"Ubuntu Security Notice USN-8028-8 vom 2026-02-24","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-3083.html","summary":"Oracle Linux Security Advisory ELSA-2026-3083 vom 2026-02-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html","summary":"SUSE Security Update SUSE-SU-2026:20479-1 vom 2026-02-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html","summary":"SUSE Security Update SUSE-SU-2026:20477-1 vom 2026-02-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html","summary":"SUSE Security Update SUSE-SU-2026:20520-1 vom 2026-02-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html","summary":"SUSE Security Update SUSE-SU-2026:20498-1 vom 2026-02-27","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K7KIWX7XP3UMVFSHT47OOZ24TQQYNNHI/","summary":"openSUSE Security Update OPENSUSE-SU-2026:20287-1 vom 2026-02-28","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8074-1","summary":"Ubuntu Security Notice USN-8074-1 vom 2026-03-04","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8074-2","summary":"Ubuntu Security Notice USN-8074-2 vom 2026-03-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html","summary":"SUSE Security Update SUSE-SU-2026:20599-1 vom 2026-03-05","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024590.html","summary":"SUSE Security Update SUSE-SU-2026:20555-1 vom 2026-03-05","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html","summary":"SUSE Security Update SUSE-SU-2026:20615-1 vom 2026-03-05","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html","summary":"SUSE Security Update SUSE-SU-2026:20560-1 vom 2026-03-05","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html","summary":"SUSE Security Update SUSE-SU-2026:20570-1 vom 2026-03-05","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-50144.html","summary":"Oracle Linux Security Advisory ELSA-2026-50144 vom 2026-03-11","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5197","summary":"Red Hat Security Advisory RHSA-2026:5197 vom 2026-03-23","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5692","summary":"Red Hat Security Advisory RHSA-2026:5692 vom 2026-03-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html","summary":"SUSE Security Update SUSE-SU-2026:20772-1 vom 2026-03-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html","summary":"SUSE Security Update SUSE-SU-2026:20819-1 vom 2026-03-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html","summary":"SUSE Security Update SUSE-SU-2026:20794-1 vom 2026-03-25","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8126-1","summary":"Ubuntu Security Notice USN-8126-1 vom 2026-03-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html","summary":"SUSE Security Update SUSE-SU-2026:20845-1 vom 2026-03-28","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html","summary":"SUSE Security Update SUSE-SU-2026:20872-1 vom 2026-03-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html","summary":"SUSE Security Update SUSE-SU-2026:20876-1 vom 2026-03-30","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6193","summary":"Red Hat Security Advisory RHSA-2026:6193 vom 2026-03-30","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7268179","summary":"IBM Security Bulletin 7268179 vom 2026-03-31","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8141-1","summary":"Ubuntu Security Notice USN-8141-1 vom 2026-04-01","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6954","summary":"Red Hat Security Advisory RHSA-2026:6954 vom 2026-04-08","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6961","summary":"Red Hat Security Advisory RHSA-2026:6961 vom 2026-04-08","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:7100","summary":"Red Hat Security Advisory RHSA-2026:7100 vom 2026-04-08","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:7013","summary":"Red Hat Security Advisory RHSA-2026:7013 vom 2026-04-08","category":"external"}],"severity":"high","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://lore.kernel.org/linux-cve-announce/","published":"2025-07-08","updated":"2026-04-08","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-09T09:00:51.479Z","sourceUrl":"https://lore.kernel.org/linux-cve-announce/","added":"2026-04-08T00:00:00.000Z","public_url":"https://lore.kernel.org/linux-cve-announce/","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-w-2025-1517 cve-2025-38238 linux kernel: mehrere schwachstellen ermöglichen denial of service bsi bsi","public_published":"2025-07-08","public_updated":"2026-04-08","public_display_date":"2026-04-08","public_sort_date":"2026-04-08","public_period_date":"2026-04-08"},{"id":"BSI:WID-SEC-W-2025-2518","cve":"CVE-2025-31133","title":"Red Hat Enterprise Linux (runc): Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen","date":"2025-11-09","published":"2025-11-09","updated":"2026-04-08","source_published":"2025-11-09","source_updated":"2026-04-08","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://access.redhat.com/errata/RHSA-2025:19927","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2518.json","summary":"WID-SEC-W-2025-2518 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2518","summary":"WID-SEC-2025-2518 - Portal Version","category":"self"},{"url":"https://access.redhat.com/errata/RHSA-2025:19927","summary":"Red Hat Security Advisory vom 2025-11-09","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-19927.html","summary":"Oracle Linux Security Advisory ELSA-2025-19927 vom 2025-11-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:20957","summary":"Red Hat Security Advisory RHSA-2025:20957 vom 2025-11-11","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:21220","summary":"Red Hat Security Advisory RHSA-2025:21220 vom 2025-11-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-November/023271.html","summary":"SUSE Security Update SUSE-SU-2025:4081-1 vom 2025-11-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-November/023273.html","summary":"SUSE Security Update SUSE-SU-2025:4079-1 vom 2025-11-12","category":"external"},{"url":"https://cloud.google.com/support/bulletins#gcp-2025-066","summary":"Google Cloud Platform Security Bulletin GCP-2025-066 vom 2025-11-12","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:21232","summary":"Red Hat Security Advisory RHSA-2025:21232 vom 2025-11-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:21633","summary":"Red Hat Security Advisory RHSA-2025:21633 vom 2025-11-18","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:21634","summary":"Red Hat Security Advisory RHSA-2025:21634 vom 2025-11-18","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:21702","summary":"Red Hat Security Advisory RHSA-2025:21702 vom 2025-11-18","category":"external"},{"url":"http://linux.oracle.com/errata/ELSA-2025-21232.html","summary":"Oracle Linux Security Advisory ELSA-2025-21232 vom 2025-11-19","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2025:21220","summary":"Rocky Linux Security Advisory RLSA-2025:21220 vom 2025-11-21","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4N2IX7IISA25FKW73QLMICMR3RMBJMXC/","summary":"openSUSE Security Update OPENSUSE-SU-2025-20072-1 vom 2025-11-21","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-November/023325.html","summary":"SUSE Security Update SUSE-SU-2025:4073-2 vom 2025-11-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:22030","summary":"Red Hat Security Advisory RHSA-2025:22030 vom 2025-11-25","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:22012","summary":"Red Hat Security Advisory RHSA-2025:22012 vom 2025-11-25","category":"external"},{"url":"https://cloud.google.com/support/bulletins#gcp-2025-069","summary":"Google Cloud Platform Security Bulletin GCP-2025-069 vom 2025-11-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:22011","summary":"Red Hat Security Advisory RHSA-2025:22011 vom 2025-11-25","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7851-2","summary":"Ubuntu Security Notice USN-7851-2 vom 2025-11-24","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-21702.html","summary":"Oracle Linux Security Advisory ELSA-2025-21702 vom 2025-11-26","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-20957.html","summary":"Oracle Linux Security Advisory ELSA-2025-20957 vom 2025-11-26","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-22011.html","summary":"Oracle Linux Security Advisory ELSA-2025-22011 vom 2025-11-26","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:21795","summary":"Red Hat Security Advisory RHSA-2025:21795 vom 2025-11-27","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:21824","summary":"Red Hat Security Advisory RHSA-2025:21824 vom 2025-11-27","category":"external"},{"url":"https://docs.docker.com/desktop/release-notes/#4530","summary":"Docker Desktop Release Notes 4.53.0 vom 2025-11-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-November/023395.html","summary":"SUSE Security Update SUSE-SU-2025:21038-1 vom 2025-11-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-November/023420.html","summary":"SUSE Security Update SUSE-SU-2025:21054-1 vom 2025-11-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-November/023397.html","summary":"SUSE Security Update SUSE-SU-2025:21036-1 vom 2025-11-27","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2025:21232","summary":"Rocky Linux Security Advisory RLSA-2025:21232 vom 2025-11-28","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2025:22012","summary":"Rocky Linux Security Advisory RLSA-2025:22012 vom 2025-11-28","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2025:22011","summary":"Rocky Linux Security Advisory RLSA-2025:22011 vom 2025-11-28","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-November/023432.html","summary":"SUSE Security Update SUSE-SU-2025:21072-1 vom 2025-11-28","category":"external"},{"url":"https://docs.cloud.google.com/container-optimized-os/docs/release-notes#November_07_2025","summary":"Container-Optimized OS release notes vom 2025-12-02","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-21220.html","summary":"Oracle Linux Security Advisory ELSA-2025-21220 vom 2025-12-03","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-22012.html","summary":"Oracle Linux Security Advisory ELSA-2025-22012 vom 2025-12-03","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:22275","summary":"Red Hat Security Advisory RHSA-2025:22275 vom 2025-12-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:23078","summary":"Red Hat Security Advisory RHSA-2025:23078 vom 2025-12-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:23079","summary":"Red Hat Security Advisory RHSA-2025:23079 vom 2025-12-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:23080","summary":"Red Hat Security Advisory RHSA-2025:23080 vom 2025-12-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-December/023516.html","summary":"SUSE Security Update SUSE-SU-2025:21136-1 vom 2025-12-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:23202","summary":"Red Hat Security Advisory RHSA-2025:23202 vom 2025-12-15","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:23449","summary":"Red Hat Security Advisory RHSA-2025:23449 vom 2025-12-17","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:23543","summary":"Red Hat Security Advisory RHSA-2025:23543 vom 2025-12-18","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:23347","summary":"Red Hat Security Advisory RHSA-2025:23347 vom 2025-12-18","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2025:23543","summary":"Rocky Linux Security Advisory RLSA-2025:23543 vom 2025-12-18","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QQPKJQ6SZIZSADP4WF47M27JCPCWUOEL/","summary":"openSUSE Security Update OPENSUSE-SU-2025:15843-1 vom 2025-12-25","category":"external"},{"url":"http://linux.oracle.com/errata/ELSA-2025-23543.html","summary":"Oracle Linux Security Advisory ELSA-2025-23543 vom 2025-12-25","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:0050","summary":"Red Hat Security Advisory RHSA-2026:0050 vom 2026-01-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:23113","summary":"Red Hat Security Advisory RHSA-2025:23113 vom 2026-01-07","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:0424","summary":"Red Hat Security Advisory RHSA-2026:0424 vom 2026-01-12","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:0426","summary":"Red Hat Security Advisory RHSA-2026:0426 vom 2026-01-12","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:0425","summary":"Red Hat Security Advisory RHSA-2026:0425 vom 2026-01-12","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:0315","summary":"Red Hat Security Advisory RHSA-2026:0315 vom 2026-01-15","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:0316","summary":"Red Hat Security Advisory RHSA-2026:0316 vom 2026-01-15","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:0418","summary":"Red Hat Security Advisory RHSA-2026:0418 vom 2026-01-15","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:0331","summary":"Red Hat Security Advisory RHSA-2026:0331 vom 2026-01-15","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:0676","summary":"Red Hat Security Advisory RHSA-2026:0676 vom 2026-01-22","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:0701","summary":"Red Hat Security Advisory RHSA-2026:0701 vom 2026-01-22","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-January/023881.html","summary":"SUSE Security Update SUSE-SU-2026:20103-1 vom 2026-01-23","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-January/023875.html","summary":"SUSE Security Update SUSE-SU-2026:20116-1 vom 2026-01-23","category":"external"},{"url":"https://www.dell.com/support/kbdoc/de-de/000421570/dsa-2026-030-security-update-for-dell-networker-vproxy-multiple-third-party-component-vulnerabilities","summary":"Dell Security Advisory DSA-2026-030 vom 2026-01-30","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:0995","summary":"Red Hat Security Advisory RHSA-2026:0995 vom 2026-01-30","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:1730","summary":"Red Hat Security Advisory RHSA-2026:1730 vom 2026-02-02","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MAQDE5E54BFLPO3DKRMUKWK3AXGAW3EP/","summary":"openSUSE Security Update OPENSUSE-SU-2026:20140-1 vom 2026-02-03","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:1942","summary":"Red Hat Security Advisory RHSA-2026:1942 vom 2026-02-04","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2034","summary":"Red Hat Security Advisory RHSA-2026:2034 vom 2026-02-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:1540","summary":"Red Hat Security Advisory RHSA-2026:1540 vom 2026-02-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2106","summary":"Red Hat Security Advisory RHSA-2026:2106 vom 2026-02-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2343","summary":"Red Hat Security Advisory RHSA-2026:2343 vom 2026-02-09","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2456","summary":"Red Hat Security Advisory RHSA-2026:2456 vom 2026-02-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2754","summary":"Red Hat Security Advisory RHSA-2026:2754 vom 2026-02-16","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2681","summary":"Red Hat Security Advisory RHSA-2026:2681 vom 2026-02-16","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2762","summary":"Red Hat Security Advisory RHSA-2026:2762 vom 2026-02-16","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2695","summary":"Red Hat Security Advisory RHSA-2026:2695 vom 2026-02-16","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2951","summary":"Red Hat Security Advisory RHSA-2026:2951 vom 2026-02-18","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2975","summary":"Red Hat Security Advisory RHSA-2026:2975 vom 2026-02-25","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3462","summary":"Red Hat Security Advisory RHSA-2026:3462 vom 2026-02-27","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3461","summary":"Red Hat Security Advisory RHSA-2026:3461 vom 2026-02-27","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3416","summary":"Red Hat Security Advisory RHSA-2026:3416 vom 2026-03-04","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3713","summary":"Red Hat Security Advisory RHSA-2026:3713 vom 2026-03-04","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3391","summary":"Red Hat Security Advisory RHSA-2026:3391 vom 2026-03-05","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024659.html","summary":"SUSE Security Update SUSE-SU-2026:20641-1 vom 2026-03-09","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4532","summary":"Red Hat Security Advisory RHSA-2026:4532 vom 2026-03-12","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4533","summary":"Red Hat Security Advisory RHSA-2026:4533 vom 2026-03-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4531","summary":"Red Hat Security Advisory RHSA-2026:4531 vom 2026-03-12","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4693","summary":"Red Hat Security Advisory RHSA-2026:4693 vom 2026-03-17","category":"external"},{"url":"http://linux.oracle.com/errata/ELSA-2026-4672.html","summary":"Oracle Linux Security Advisory ELSA-2026-4672 vom 2026-03-18","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6492","summary":"Red Hat Security Advisory RHSA-2026:6492 vom 2026-04-09","category":"external"}],"severity":"high","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://access.redhat.com/errata/RHSA-2025:19927","published":"2025-11-09","updated":"2026-04-08","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-10T06:00:53.149Z","sourceUrl":"https://access.redhat.com/errata/RHSA-2025:19927","added":"2026-04-08T00:00:00.000Z","public_url":"https://access.redhat.com/errata/RHSA-2025:19927","public_source":"Red Hat","public_source_slug":"red-hat","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-w-2025-2518 cve-2025-31133 red hat enterprise linux (runc): mehrere schwachstellen ermöglichen umgehen von sicherheitsvorkehrungen red hat bsi","public_published":"2025-11-09","public_updated":"2026-04-08","public_display_date":"2026-04-08","public_sort_date":"2026-04-08","public_period_date":"2026-04-08"},{"id":"BSI:WID-SEC-W-2025-2638","cve":"CVE-2025-54770","title":"Grub: Mehrere Schwachstellen","date":"2025-11-18","published":"2025-11-18","updated":"2026-04-08","source_published":"2025-11-18","source_updated":"2026-04-08","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://seclists.org/oss-sec/2025/q4/191","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2638.json","summary":"WID-SEC-W-2025-2638 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2638","summary":"WID-SEC-2025-2638 - Portal Version","category":"self"},{"url":"https://seclists.org/oss-sec/2025/q4/191","summary":"OSS Security Mailing List vom 2025-11-18","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KDODU4W7BGW2ULT35JBOJLS5BJO2M3DX/","summary":"SUSE Security Update SUSE-SU-2025:4143-1 vom 2025-11-20","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-November/023310.html","summary":"SUSE Security Update SUSE-SU-2025:4152-1 vom 2025-11-21","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QNOLPRRIM6HJ6IRJ4AWWG56GX4IBAAJK/","summary":"openSUSE Security Update OPENSUSE-SU-2025:15749-1 vom 2025-11-22","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y52BW7QY7H7DNOJGMPQAKTXUBOA4537U/","summary":"SUSE Security Update SUSE-SU-2025:4196-1 vom 2025-11-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-November/023335.html","summary":"SUSE Security Update SUSE-SU-2025:4197-1 vom 2025-11-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-November/023336.html","summary":"SUSE Security Update SUSE-SU-2025:4196-1 vom 2025-11-24","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7QV6KRJVIOQ5HAKGN4YBUZLHY2JC2Y6/","summary":"SUSE Security Update SUSE-SU-2025:4224-1 vom 2025-11-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-November/023417.html","summary":"SUSE Security Update SUSE-SU-2025:21062-1 vom 2025-11-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-November/023439.html","summary":"SUSE Security Update SUSE-SU-2025:4305-1 vom 2025-11-28","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K2523KE5PWRISM344FWJVBE6KCPRRPYS/","summary":"openSUSE Security Update OPENSUSE-SU-2025:20163-1 vom 2025-12-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-December/023588.html","summary":"SUSE Security Update SUSE-SU-2025:21223-1 vom 2025-12-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-December/023596.html","summary":"SUSE Security Update SUSE-SU-2025:21212-1 vom 2025-12-18","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2-2025-3107.html","summary":"Amazon Linux Security Advisory ALAS2-2025-3107 vom 2026-01-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4653","summary":"Red Hat Security Advisory RHSA-2026:4653 vom 2026-03-17","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4652","summary":"Red Hat Security Advisory RHSA-2026:4652 vom 2026-03-17","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4649","summary":"Red Hat Security Advisory RHSA-2026:4649 vom 2026-03-17","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4648","summary":"Red Hat Security Advisory RHSA-2026:4648 vom 2026-03-16","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4654","summary":"Red Hat Security Advisory RHSA-2026:4654 vom 2026-03-17","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4822","summary":"Red Hat Security Advisory RHSA-2026:4822 vom 2026-03-17","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4830","summary":"Red Hat Security Advisory RHSA-2026:4830 vom 2026-03-17","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4760","summary":"Red Hat Security Advisory RHSA-2026:4760 vom 2026-03-17","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-4649.html","summary":"Oracle Linux Security Advisory ELSA-2026-4649 vom 2026-03-17","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4823","summary":"Red Hat Security Advisory RHSA-2026:4823 vom 2026-03-17","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4900","summary":"Red Hat Security Advisory RHSA-2026:4900 vom 2026-03-18","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-4648.html","summary":"Oracle Linux Security Advisory ELSA-2026-4648 vom 2026-03-18","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-4760.html","summary":"Oracle Linux Security Advisory ELSA-2026-4760 vom 2026-03-18","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4998","summary":"Red Hat Security Advisory RHSA-2026:4998 vom 2026-03-19","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5074","summary":"Red Hat Security Advisory RHSA-2026:5074 vom 2026-03-19","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5233","summary":"Red Hat Security Advisory RHSA-2026:5233 vom 2026-03-23","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5127","summary":"Red Hat Security Advisory RHSA-2026:5127 vom 2026-03-25","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-5233.html","summary":"Oracle Linux Security Advisory ELSA-2026-5233 vom 2026-04-07","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6492","summary":"Red Hat Security Advisory RHSA-2026:6492 vom 2026-04-09","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://seclists.org/oss-sec/2025/q4/191","published":"2025-11-18","updated":"2026-04-08","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-10T06:00:53.149Z","sourceUrl":"https://seclists.org/oss-sec/2025/q4/191","added":"2026-04-08T00:00:00.000Z","public_url":"https://seclists.org/oss-sec/2025/q4/191","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-w-2025-2638 cve-2025-54770 grub: mehrere schwachstellen bsi bsi","public_published":"2025-11-18","public_updated":"2026-04-08","public_display_date":"2026-04-08","public_sort_date":"2026-04-08","public_period_date":"2026-04-08"},{"id":"BSI:WID-SEC-W-2026-0255","cve":"CVE-2026-1281","title":"Ivanti Endpoint Manager Mobile: Mehrere Schwachstellen ermöglichen Codeausführung","date":"2026-01-29","published":"2026-01-29","updated":"2026-04-08","source_published":"2026-01-29","source_updated":"2026-04-08","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://www.ivanti.com/blog/january-2026-epmm-security-update","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0255.json","summary":"WID-SEC-W-2026-0255 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0255","summary":"WID-SEC-2026-0255 - Portal Version","category":"self"},{"url":"https://www.ivanti.com/blog/january-2026-epmm-security-update","summary":"January 2026 EPMM Security Update vom 2026-01-29","category":"external"},{"url":"https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340","summary":"Security Advisory Ivanti Endpoint Manager Mobile vom 2026-01-29","category":"external"},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-1340","summary":"CISA KEV CVE-2026-1340 vom 2026-04-08","category":"external"}],"severity":"critical","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://www.ivanti.com/blog/january-2026-epmm-security-update","published":"2026-01-29","updated":"2026-04-08","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-10T06:00:53.149Z","sourceUrl":"https://www.ivanti.com/blog/january-2026-epmm-security-update","added":"2026-04-08T00:00:00.000Z","public_url":"https://www.ivanti.com/blog/january-2026-epmm-security-update","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"critical","search_text":"bsi:wid-sec-w-2026-0255 cve-2026-1281 ivanti endpoint manager mobile: mehrere schwachstellen ermöglichen codeausführung bsi bsi","public_published":"2026-01-29","public_updated":"2026-04-08","public_display_date":"2026-04-08","public_sort_date":"2026-04-08","public_period_date":"2026-04-08"},{"id":"BSI:WID-SEC-W-2026-1036","cve":"CVE-2026-39980","title":"OpenCTI: Schwachstelle ermöglicht Codeausführung","date":"2026-04-08","published":"2026-04-08","updated":null,"source_published":"2026-04-08","source_updated":"2026-04-08","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://github.com/OpenCTI-Platform/opencti/security/advisories/GHSA-jv9r-jw2f-rhrf","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1036.json","summary":"WID-SEC-W-2026-1036 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1036","summary":"WID-SEC-2026-1036 - Portal Version","category":"self"},{"url":"https://github.com/OpenCTI-Platform/opencti/security/advisories/GHSA-jv9r-jw2f-rhrf","summary":"GitHub Security Advisory GHSA-jv9r-jw2f-rhrf vom 2026-04-08","category":"external"}],"severity":"high","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://github.com/OpenCTI-Platform/opencti/security/advisories/GHSA-jv9r-jw2f-rhrf","published":"2026-04-08","updated":"2026-04-08","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-10T06:00:53.149Z","sourceUrl":"https://github.com/OpenCTI-Platform/opencti/security/advisories/GHSA-jv9r-jw2f-rhrf","added":"2026-04-08T00:00:00.000Z","public_url":"https://github.com/OpenCTI-Platform/opencti/security/advisories/GHSA-jv9r-jw2f-rhrf","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-w-2026-1036 cve-2026-39980 opencti: schwachstelle ermöglicht codeausführung bsi bsi","public_published":"2026-04-08","public_updated":null,"public_display_date":"2026-04-08","public_sort_date":"2026-04-08","public_period_date":"2026-04-08"},{"id":"BSI:WID-SEC-W-2026-1037","cve":"CVE-2026-31411","title":"Linux Kernel: Schwachstelle ermöglicht Denial of Service","date":"2026-04-08","published":"2026-04-08","updated":null,"source_published":"2026-04-08","source_updated":"2026-04-08","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://lore.kernel.org/linux-cve-announce/2026040820-CVE-2026-31411-7ef9@gregkh/","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1037.json","summary":"WID-SEC-W-2026-1037 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1037","summary":"WID-SEC-2026-1037 - Portal Version","category":"self"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040820-CVE-2026-31411-7ef9@gregkh/","summary":"Linux Kernel CVE-Announcement CVE-2026-31411 vom 2026-04-08","category":"external"},{"url":"https://gist.github.com/mrpre/1ba5949c45529c511152e2f4c755b0f3","summary":"PoC vom 2026-04-08","category":"external"}],"severity":"low","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://lore.kernel.org/linux-cve-announce/2026040820-CVE-2026-31411-7ef9@gregkh/","published":"2026-04-08","updated":"2026-04-08","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-10T06:00:53.149Z","sourceUrl":"https://lore.kernel.org/linux-cve-announce/2026040820-CVE-2026-31411-7ef9@gregkh/","added":"2026-04-08T00:00:00.000Z","public_url":"https://lore.kernel.org/linux-cve-announce/2026040820-CVE-2026-31411-7ef9@gregkh/","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"low","search_text":"bsi:wid-sec-w-2026-1037 cve-2026-31411 linux kernel: schwachstelle ermöglicht denial of service bsi bsi","public_published":"2026-04-08","public_updated":null,"public_display_date":"2026-04-08","public_sort_date":"2026-04-08","public_period_date":"2026-04-08"},{"id":"CVE-2026-29181","cve":"CVE-2026-29181","title":"OpenTelemetry-Go multi-value `baggage` header extraction causes excessive allocations (remote dos amplification)","source_published":"2026-04-14","source_updated":"2026-04-08","source_doc_published":"2026-04-14","source_doc_updated":null,"published":"2026-04-07","date":"2026-04-07","updated":"2026-04-08","date_basis":"msrc_cve","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://www.cve.org/CVERecord?id=CVE-2026-29181","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-29181","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-29181","published":"2026-04-14","updated":"2026-04-08","checked_at":"2026-04-16T13:31:29.991Z","status_ok":null,"source_kind":"vendor","confidence":0.92},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-29181","published":"2026-04-07","updated":"2026-04-08","checked_at":"2026-04-16T13:31:30.647Z","status_ok":true,"source_kind":"msrc_cve","confidence":0.99}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":"2026-04-07","cve_updated":"2026-04-08","published_at":"2026-04-07","updated_at":"2026-04-08","link_checked_at":"2026-04-16T13:31:30.647Z","sourceUrl":"https://www.cve.org/CVERecord?id=CVE-2026-29181","added":"2026-04-08T00:00:00.000Z","public_url":"https://www.cve.org/CVERecord?id=CVE-2026-29181","public_source":"CVE","public_source_slug":"cve","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-29181 cve-2026-29181 opentelemetry-go multi-value `baggage` header extraction causes excessive allocations (remote dos amplification) microsoft cve msrc","public_published":"2026-04-07","public_updated":"2026-04-08","public_display_date":"2026-04-08","public_sort_date":"2026-04-08","public_period_date":"2026-04-08","source_url_repaired_from":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-29181"},{"id":"CVE:CVE-2026-1340","cve":"CVE-2026-1340","title":"Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability","date":"2026-04-08","vendor":"Ivanti","product":"Endpoint Manager Mobile (EPMM)","source":"CISA-KEV","cisa_url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog","source_url":"https://nvd.nist.gov/vuln/detail/CVE-2026-1340","severity":"high","ransomware":"Unknown","cvss":null,"exploited":true,"published":"2026-04-08","updated":null,"source_published":"2026-04-08","source_updated":null,"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"candidates":[{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-1340","published":"2026-04-08","updated":"2026-04-08","checked_at":null,"status_ok":null,"source_kind":"nvd","confidence":0.8}],"date_basis":"nvd","link_checked_at":null,"sourceUrl":"https://nvd.nist.gov/vuln/detail/CVE-2026-1340","added":"2026-04-08T00:00:00.000Z","public_url":"https://nvd.nist.gov/vuln/detail/CVE-2026-1340","public_source":"CVE","public_source_slug":"cve","vendor_slug":"ivanti","severity_norm":"high","search_text":"cve:cve-2026-1340 cve-2026-1340 ivanti endpoint manager mobile (epmm) code injection vulnerability ivanti endpoint manager mobile (epmm) cve cisa-kev unknown","public_published":"2026-04-08","public_updated":null,"public_display_date":"2026-04-08","public_sort_date":"2026-04-08","public_period_date":"2026-04-08"},{"id":"BSI:WID-SEC-2025-2730","cve":"","title":"Wireshark: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-04-07","published":"2026-04-07","updated":null,"source_published":"2026-04-07","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2730","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2730","published":"2026-04-07","updated":"2026-04-07","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-08T09:00:52.459Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2730","added":"2026-04-07T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2730","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-07","public_updated":null,"public_display_date":"2026-04-07","public_sort_date":"2026-04-07","public_period_date":"2026-04-07","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2730 wireshark: mehrere schwachstellen ermöglichen denial of service bsi bsi"},{"id":"BSI:WID-SEC-2025-2750","cve":"","title":"Apache HTTP Server: Mehrere Schwachstellen","date":"2026-04-07","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2750","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-08T09:00:52.459Z","published":"2026-04-07","source_published":"2026-04-07","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2750","published":"2026-04-07","updated":"2026-04-07","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2750","added":"2026-04-07T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2750","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-07","public_updated":null,"public_display_date":"2026-04-07","public_sort_date":"2026-04-07","public_period_date":"2026-04-07","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2750 apache http server: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2025-2848","cve":"","title":"Keycloak: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen","date":"2026-04-07","published":"2026-04-07","updated":null,"source_published":"2026-04-07","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2848","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2848","published":"2026-04-07","updated":"2026-04-07","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-08T09:00:52.459Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2848","added":"2026-04-07T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2848","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2025-2848 keycloak: schwachstelle ermöglicht umgehen von sicherheitsvorkehrungen bsi bsi","public_published":"2026-04-07","public_updated":null,"public_display_date":"2026-04-07","public_sort_date":"2026-04-07","public_period_date":"2026-04-07"},{"id":"BSI:WID-SEC-2026-0152","cve":"","title":"Keycloak (OIDC Dynamic Client Registration): Schwachstelle ermöglicht Manipulation von Dateien","date":"2026-04-07","published":"2026-04-07","updated":null,"source_published":"2026-04-07","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0152","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0152","published":"2026-04-07","updated":"2026-04-07","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-08T09:00:52.459Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0152","added":"2026-04-07T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0152","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-0152 keycloak (oidc dynamic client registration): schwachstelle ermöglicht manipulation von dateien bsi bsi","public_published":"2026-04-07","public_updated":null,"public_display_date":"2026-04-07","public_sort_date":"2026-04-07","public_period_date":"2026-04-07"},{"id":"BSI:WID-SEC-2026-0197","cve":"","title":"Keycloak: Mehrere Schwachstellen","date":"2026-04-07","published":"2026-04-07","updated":null,"source_published":"2026-04-07","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0197","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0197","published":"2026-04-07","updated":"2026-04-07","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-08T09:00:52.459Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0197","added":"2026-04-07T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0197","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-0197 keycloak: mehrere schwachstellen bsi bsi","public_published":"2026-04-07","public_updated":null,"public_display_date":"2026-04-07","public_sort_date":"2026-04-07","public_period_date":"2026-04-07"},{"id":"BSI:WID-SEC-2026-0394","cve":"","title":"Keycloak: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen","date":"2026-04-07","published":"2026-04-07","updated":null,"source_published":"2026-04-07","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0394","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0394","published":"2026-04-07","updated":"2026-04-07","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-08T09:00:52.459Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0394","added":"2026-04-07T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0394","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-07","public_updated":null,"public_display_date":"2026-04-07","public_sort_date":"2026-04-07","public_period_date":"2026-04-07","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0394 keycloak: mehrere schwachstellen ermöglichen offenlegung von informationen bsi bsi"},{"id":"BSI:WID-SEC-2026-0508","cve":"","title":"Keycloak: Schwachstelle ermöglicht Offenlegung von Informationen","date":"2026-04-07","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0508","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-08T09:00:52.459Z","published":"2026-04-07","source_published":"2026-04-07","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0508","published":"2026-04-07","updated":"2026-04-07","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0508","added":"2026-04-07T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0508","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-07","public_updated":null,"public_display_date":"2026-04-07","public_sort_date":"2026-04-07","public_period_date":"2026-04-07","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0508 keycloak: schwachstelle ermöglicht offenlegung von informationen bsi bsi"},{"id":"BSI:WID-SEC-2026-0514","cve":"","title":"FreeRDP: Mehrere Schwachstellen","date":"2026-04-07","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0514","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-08T09:00:52.459Z","published":"2026-04-07","source_published":"2026-04-07","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0514","published":"2026-04-07","updated":"2026-04-07","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0514","added":"2026-04-07T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0514","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-07","public_updated":null,"public_display_date":"2026-04-07","public_sort_date":"2026-04-07","public_period_date":"2026-04-07","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0514 freerdp: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0560","cve":"","title":"Keycloak: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen","date":"2026-04-07","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0560","severity":"low","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-08T09:00:52.459Z","published":"2026-04-07","source_published":"2026-04-07","source_updated":null,"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0560","published":"2026-04-07","updated":"2026-04-07","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"primary_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0560","primary_published":"2026-03-02","primary_updated":null,"primary_kind":"bsi_portal","primary_source":"BSI","primary_id":"BSI:WID-SEC-2026-0560","date_basis":"bsi_portal","link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0560","primaryUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0560","added":"2026-04-07T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0560","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-07","public_updated":null,"public_display_date":"2026-04-07","public_sort_date":"2026-04-07","public_period_date":"2026-04-07","severity_norm":"low","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0560 keycloak: schwachstelle ermöglicht umgehen von sicherheitsvorkehrungen bsi bsi"},{"id":"BSI:WID-SEC-2026-0628","cve":"","title":"Nextcloud Flow: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten","date":"2026-04-07","published":"2026-04-07","updated":null,"source_published":"2026-04-07","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0628","severity":"critical","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-08T09:00:52.459Z","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0628","published":"2026-04-07","updated":"2026-04-07","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0628","added":"2026-04-07T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0628","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-07","public_updated":null,"public_display_date":"2026-04-07","public_sort_date":"2026-04-07","public_period_date":"2026-04-07","severity_norm":"critical","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0628 nextcloud flow: schwachstelle ermöglicht ausführen von beliebigem programmcode mit administratorrechten bsi bsi"},{"id":"BSI:WID-SEC-2026-0693","cve":"","title":"Keycloak: Schwachstelle ermöglicht Offenlegung von Informationen","date":"2026-04-07","published":"2026-04-07","updated":null,"source_published":"2026-04-07","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0693","severity":"low","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0693","published":"2026-04-07","updated":"2026-04-07","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-08T09:00:52.459Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0693","added":"2026-04-07T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0693","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-07","public_updated":null,"public_display_date":"2026-04-07","public_sort_date":"2026-04-07","public_period_date":"2026-04-07","severity_norm":"low","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0693 keycloak: schwachstelle ermöglicht offenlegung von informationen bsi bsi"},{"id":"BSI:WID-SEC-2026-0787","cve":"","title":"Keycloak: Mehrere Schwachstellen","date":"2026-04-07","published":"2026-04-07","updated":null,"source_published":"2026-04-07","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0787","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0787","published":"2026-04-07","updated":"2026-04-07","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-08T09:00:52.459Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0787","added":"2026-04-07T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0787","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-07","public_updated":null,"public_display_date":"2026-04-07","public_sort_date":"2026-04-07","public_period_date":"2026-04-07","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0787 keycloak: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0789","cve":"","title":"Roundcube: Mehrere Schwachstellen","date":"2026-04-07","published":"2026-04-07","updated":null,"source_published":"2026-04-07","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0789","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0789","published":"2026-04-07","updated":"2026-04-07","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-07T09:01:29.157Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0789","added":"2026-04-07T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0789","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-07","public_updated":null,"public_display_date":"2026-04-07","public_sort_date":"2026-04-07","public_period_date":"2026-04-07","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0789 roundcube: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0873","cve":"","title":"docker: Mehrere Schwachstellen","date":"2026-04-07","published":"2026-04-07","updated":null,"source_published":"2026-04-07","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0873","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0873","published":"2026-04-07","updated":"2026-04-07","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-08T09:00:52.459Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0873","added":"2026-04-07T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0873","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-07","public_updated":null,"public_display_date":"2026-04-07","public_sort_date":"2026-04-07","public_period_date":"2026-04-07","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0873 docker: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0891","cve":"","title":"Dovecot: Mehrere Schwachstellen","date":"2026-04-07","published":"2026-04-07","updated":null,"source_published":"2026-04-07","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0891","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0891","published":"2026-04-07","updated":"2026-04-07","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-08T09:00:52.459Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0891","added":"2026-04-07T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0891","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-07","public_updated":null,"public_display_date":"2026-04-07","public_sort_date":"2026-04-07","public_period_date":"2026-04-07","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0891 dovecot: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0917","cve":"","title":"OpenSC: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff","date":"2026-04-07","published":"2026-04-07","updated":null,"source_published":"2026-04-07","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0917","severity":"low","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0917","published":"2026-04-07","updated":"2026-04-07","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-08T09:00:52.459Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0917","added":"2026-04-07T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0917","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-07","public_updated":null,"public_display_date":"2026-04-07","public_sort_date":"2026-04-07","public_period_date":"2026-04-07","severity_norm":"low","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0917 opensc: mehrere schwachstellen ermöglichen nicht spezifizierten angriff bsi bsi"},{"id":"BSI:WID-SEC-2026-0932","cve":"","title":"PowerDNS: Mehrere Schwachstellen","date":"2026-04-07","published":"2026-04-07","updated":null,"source_published":"2026-04-07","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0932","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0932","published":"2026-04-07","updated":"2026-04-07","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-08T09:00:52.459Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0932","added":"2026-04-07T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0932","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-07","public_updated":null,"public_display_date":"2026-04-07","public_sort_date":"2026-04-07","public_period_date":"2026-04-07","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0932 powerdns: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0934","cve":"","title":"Foxit PDF Editor und Reader: Mehrere Schwachstellen","date":"2026-04-07","published":"2026-04-07","updated":null,"source_published":"2026-04-07","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0934","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0934","published":"2026-04-07","updated":"2026-04-07","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-08T09:00:52.459Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0934","added":"2026-04-07T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0934","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-07","public_updated":null,"public_display_date":"2026-04-07","public_sort_date":"2026-04-07","public_period_date":"2026-04-07","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0934 foxit pdf editor und reader: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0963","cve":"","title":"Microsoft Azure: Mehrere Schwachstellen","date":"2026-04-07","published":"2026-04-07","updated":null,"source_published":"2026-04-07","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0963","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0963","published":"2026-04-07","updated":"2026-04-07","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-08T09:00:52.459Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0963","added":"2026-04-07T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0963","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-0963 microsoft azure: mehrere schwachstellen bsi bsi","public_published":"2026-04-07","public_updated":null,"public_display_date":"2026-04-07","public_sort_date":"2026-04-07","public_period_date":"2026-04-07"},{"id":"BSI:WID-SEC-2026-0964","cve":"","title":"Cisco Smart Software Manager On-Prem: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten","date":"2026-04-07","published":"2026-04-07","updated":null,"source_published":"2026-04-07","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0964","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0964","published":"2026-04-07","updated":"2026-04-07","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-08T09:00:52.459Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0964","added":"2026-04-07T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0964","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-0964 cisco smart software manager on-prem: schwachstelle ermöglicht ausführen von beliebigem programmcode mit administratorrechten bsi bsi","public_published":"2026-04-07","public_updated":null,"public_display_date":"2026-04-07","public_sort_date":"2026-04-07","public_period_date":"2026-04-07"},{"id":"BSI:WID-SEC-2026-0965","cve":"","title":"IBM Maximo Asset Management: Schwachstelle ermöglicht Denial of Service","date":"2026-04-07","published":"2026-04-07","updated":null,"source_published":"2026-04-07","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0965","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0965","published":"2026-04-07","updated":"2026-04-07","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-08T09:00:52.459Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0965","added":"2026-04-07T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0965","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-0965 ibm maximo asset management: schwachstelle ermöglicht denial of service bsi bsi","public_published":"2026-04-07","public_updated":null,"public_display_date":"2026-04-07","public_sort_date":"2026-04-07","public_period_date":"2026-04-07"},{"id":"BSI:WID-SEC-2026-0968","cve":"","title":"WP Royal Royal Elementor Addons: Schwachstelle ermöglicht Cross-Site Scripting","date":"2026-04-07","published":"2026-04-07","updated":null,"source_published":"2026-04-07","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0968","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0968","published":"2026-04-07","updated":"2026-04-07","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-08T09:00:52.459Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0968","added":"2026-04-07T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0968","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-0968 wp royal royal elementor addons: schwachstelle ermöglicht cross-site scripting bsi bsi","public_published":"2026-04-07","public_updated":null,"public_display_date":"2026-04-07","public_sort_date":"2026-04-07","public_period_date":"2026-04-07"},{"id":"BSI:WID-SEC-2026-0969","cve":"","title":"FasterXML Jackson: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen","date":"2026-04-07","published":"2026-04-07","updated":null,"source_published":"2026-04-07","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0969","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0969","published":"2026-04-07","updated":"2026-04-07","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-08T09:00:52.459Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0969","added":"2026-04-07T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0969","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-0969 fasterxml jackson: schwachstelle ermöglicht umgehen von sicherheitsvorkehrungen bsi bsi","public_published":"2026-04-07","public_updated":null,"public_display_date":"2026-04-07","public_sort_date":"2026-04-07","public_period_date":"2026-04-07"},{"id":"BSI:WID-SEC-2026-0970","cve":"","title":"Keycloak: Schwachstelle ermöglicht Offenlegung von Informationen","date":"2026-04-07","published":"2026-04-07","updated":null,"source_published":"2026-04-07","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0970","severity":"low","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0970","published":"2026-04-07","updated":"2026-04-07","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-08T09:00:52.459Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0970","added":"2026-04-07T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0970","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"low","search_text":"bsi:wid-sec-2026-0970 keycloak: schwachstelle ermöglicht offenlegung von informationen bsi bsi","public_published":"2026-04-07","public_updated":null,"public_display_date":"2026-04-07","public_sort_date":"2026-04-07","public_period_date":"2026-04-07"},{"id":"BSI:WID-SEC-2026-0972","cve":"","title":"MariaDB: Schwachstelle ermöglicht Denial of Service","date":"2026-04-07","published":"2026-04-07","updated":null,"source_published":"2026-04-07","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0972","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0972","published":"2026-04-07","updated":"2026-04-07","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-08T09:00:52.459Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0972","added":"2026-04-07T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0972","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-0972 mariadb: schwachstelle ermöglicht denial of service bsi bsi","public_published":"2026-04-07","public_updated":null,"public_display_date":"2026-04-07","public_sort_date":"2026-04-07","public_period_date":"2026-04-07"},{"id":"BSI:WID-SEC-2026-0973","cve":"","title":"Google Android: Mehrere Schwachstellen","date":"2026-04-07","published":"2026-04-07","updated":null,"source_published":"2026-04-07","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0973","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0973","published":"2026-04-07","updated":"2026-04-07","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-08T09:00:52.459Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0973","added":"2026-04-07T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0973","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-0973 google android: mehrere schwachstellen bsi bsi","public_published":"2026-04-07","public_updated":null,"public_display_date":"2026-04-07","public_sort_date":"2026-04-07","public_period_date":"2026-04-07"},{"id":"BSI:WID-SEC-2026-0975","cve":"","title":"avahi: Schwachstelle ermöglicht Denial of Service","date":"2026-04-07","published":"2026-04-07","updated":null,"source_published":"2026-04-07","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0975","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0975","published":"2026-04-07","updated":"2026-04-07","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-08T09:00:52.459Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0975","added":"2026-04-07T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0975","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-0975 avahi: schwachstelle ermöglicht denial of service bsi bsi","public_published":"2026-04-07","public_updated":null,"public_display_date":"2026-04-07","public_sort_date":"2026-04-07","public_period_date":"2026-04-07"},{"id":"BSI:WID-SEC-2026-0976","cve":"","title":"CUPS: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten","date":"2026-04-07","published":"2026-04-07","updated":null,"source_published":"2026-04-07","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0976","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0976","published":"2026-04-07","updated":"2026-04-07","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-08T09:00:52.459Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0976","added":"2026-04-07T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0976","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-0976 cups: schwachstelle ermöglicht ausführen von beliebigem programmcode mit administratorrechten bsi bsi","public_published":"2026-04-07","public_updated":null,"public_display_date":"2026-04-07","public_sort_date":"2026-04-07","public_period_date":"2026-04-07"},{"id":"BSI:WID-SEC-2026-0978","cve":"","title":"Apache Traffic Server: Mehrere Schwachstellen","date":"2026-04-07","published":"2026-04-07","updated":null,"source_published":"2026-04-07","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0978","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0978","published":"2026-04-07","updated":"2026-04-07","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-08T09:00:52.459Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0978","added":"2026-04-07T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0978","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-0978 apache traffic server: mehrere schwachstellen bsi bsi","public_published":"2026-04-07","public_updated":null,"public_display_date":"2026-04-07","public_sort_date":"2026-04-07","public_period_date":"2026-04-07"},{"id":"BSI:WID-SEC-2026-0979","cve":"","title":"OpenSSH: Mehrere Schwachstellen","date":"2026-04-07","published":"2026-04-07","updated":null,"source_published":"2026-04-07","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0979","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0979","published":"2026-04-07","updated":"2026-04-07","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-08T09:00:52.459Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0979","added":"2026-04-07T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0979","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-0979 openssh: mehrere schwachstellen bsi bsi","public_published":"2026-04-07","public_updated":null,"public_display_date":"2026-04-07","public_sort_date":"2026-04-07","public_period_date":"2026-04-07"},{"id":"BSI:WID-SEC-2026-0980","cve":"","title":"OpenClaw: Mehrere Schwachstellen","date":"2026-04-07","published":"2026-04-07","updated":null,"source_published":"2026-04-07","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0980","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0980","published":"2026-04-07","updated":"2026-04-07","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-08T09:00:52.459Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0980","added":"2026-04-07T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0980","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-0980 openclaw: mehrere schwachstellen bsi bsi","public_published":"2026-04-07","public_updated":null,"public_display_date":"2026-04-07","public_sort_date":"2026-04-07","public_period_date":"2026-04-07"},{"id":"BSI:WID-SEC-2026-0981","cve":"","title":"Samsung Exynos: Mehrere Schwachstellen","date":"2026-04-07","published":"2026-04-07","updated":null,"source_published":"2026-04-07","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0981","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0981","published":"2026-04-07","updated":"2026-04-07","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-08T09:00:52.459Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0981","added":"2026-04-07T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0981","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-0981 samsung exynos: mehrere schwachstellen bsi bsi","public_published":"2026-04-07","public_updated":null,"public_display_date":"2026-04-07","public_sort_date":"2026-04-07","public_period_date":"2026-04-07"},{"id":"BSI:WID-SEC-2026-0983","cve":"","title":"Checkmk: Mehrere Schwachstellen","date":"2026-04-07","published":"2026-04-07","updated":null,"source_published":"2026-04-07","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0983","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0983","published":"2026-04-07","updated":"2026-04-07","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-08T09:00:52.459Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0983","added":"2026-04-07T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0983","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-2026-0983 checkmk: mehrere schwachstellen bsi bsi","public_published":"2026-04-07","public_updated":null,"public_display_date":"2026-04-07","public_sort_date":"2026-04-07","public_period_date":"2026-04-07"},{"id":"BSI:WID-SEC-2026-0985","cve":"","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-04-07","published":"2026-04-07","updated":null,"source_published":"2026-04-07","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0985","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0985","published":"2026-04-07","updated":"2026-04-07","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-08T09:00:52.459Z","sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0985","added":"2026-04-07T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0985","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-2026-0985 linux kernel: mehrere schwachstellen bsi bsi","public_published":"2026-04-07","public_updated":null,"public_display_date":"2026-04-07","public_sort_date":"2026-04-07","public_period_date":"2026-04-07"},{"id":"BSI:WID-SEC-W-2026-0982","cve":"","title":"OpenBSD: Schwachstelle ermöglicht nicht spezifizierten Angriff","date":"2026-04-06","published":"2026-04-06","updated":"2026-04-07","source_published":"2026-04-06","source_updated":"2026-04-07","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://www.openbsd.org/errata77.html","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0982.json","summary":"WID-SEC-W-2026-0982 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0982","summary":"WID-SEC-2026-0982 - Portal Version","category":"self"},{"url":"https://www.openbsd.org/errata77.html","summary":"OpenBSD 7.7 Errata vom 2026-04-04","category":"external"},{"url":"https://www.openbsd.org/errata78.html","summary":"OpenBSD 7.8 Errata vom 2026-04-04","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://www.openbsd.org/errata77.html","published":"2026-04-06","updated":"2026-04-07","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-08T09:00:52.459Z","sourceUrl":"https://www.openbsd.org/errata77.html","added":"2026-04-07T00:00:00.000Z","public_url":"https://www.openbsd.org/errata77.html","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-w-2026-0982 openbsd: schwachstelle ermöglicht nicht spezifizierten angriff bsi bsi","public_published":"2026-04-06","public_updated":"2026-04-07","public_display_date":"2026-04-07","public_sort_date":"2026-04-07","public_period_date":"2026-04-07"},{"id":"BSI:WID-SEC-W-2026-0994","cve":"CVE-2026-39314","title":"CUPS: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-04-07","published":"2026-04-07","updated":null,"source_published":"2026-04-07","source_updated":"2026-04-07","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://github.com/OpenPrinting/cups/security/advisories/GHSA-pp8w-2g52-7vj7","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0994.json","summary":"WID-SEC-W-2026-0994 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0994","summary":"WID-SEC-2026-0994 - Portal Version","category":"self"},{"url":"https://github.com/OpenPrinting/cups/security/advisories/GHSA-pp8w-2g52-7vj7","summary":"GitHub Security Advisory GHSA-pp8w-2g52-7vj7 vom 2026-04-07","category":"external"},{"url":"https://github.com/OpenPrinting/cups/security/advisories/GHSA-pjv5-prqp-46rg","summary":"GitHub Security Advisory GHSA-pjv5-prqp-46rg vom 2026-04-07","category":"external"}],"severity":"low","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":["last_affected"],"candidates":[{"url":"https://github.com/OpenPrinting/cups/security/advisories/GHSA-pp8w-2g52-7vj7","published":"2026-04-07","updated":"2026-04-07","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-08T10:37:35.799Z","sourceUrl":"https://github.com/OpenPrinting/cups/security/advisories/GHSA-pp8w-2g52-7vj7","added":"2026-04-07T00:00:00.000Z","public_url":"https://github.com/OpenPrinting/cups/security/advisories/GHSA-pp8w-2g52-7vj7","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"low","search_text":"bsi:wid-sec-w-2026-0994 cve-2026-39314 cups: mehrere schwachstellen ermöglichen denial of service bsi bsi","public_published":"2026-04-07","public_updated":null,"public_display_date":"2026-04-07","public_sort_date":"2026-04-07","public_period_date":"2026-04-07"},{"id":"BSI:WID-SEC-W-2026-0995","cve":"CVE-2026-28386","title":"OpenSSL: Mehrere Schwachstellen","date":"2026-04-07","published":"2026-04-07","updated":null,"source_published":"2026-04-07","source_updated":"2026-04-07","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://openssl-library.org/news/secadv/20260407.txt","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0995.json","summary":"WID-SEC-W-2026-0995 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0995","summary":"WID-SEC-2026-0995 - Portal Version","category":"self"},{"url":"https://openssl-library.org/news/secadv/20260407.txt","summary":"OpenSSL Security Advisory vom 2026-04-07","category":"external"},{"url":"https://openssl-library.org/news/vulnerabilities/","summary":"OpenSSL Vulnerabilities vom 2026-04-07","category":"external"},{"url":"https://lists.debian.org/debian-security-announce/2026/msg00111.html","summary":"Debian Security Advisory DSA-6201 vom 2026-04-08","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://openssl-library.org/news/secadv/20260407.txt","published":"2026-04-07","updated":"2026-04-07","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-08T10:37:35.799Z","sourceUrl":"https://openssl-library.org/news/secadv/20260407.txt","added":"2026-04-07T00:00:00.000Z","public_url":"https://openssl-library.org/news/secadv/20260407.txt","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-w-2026-0995 cve-2026-28386 openssl: mehrere schwachstellen bsi bsi","public_published":"2026-04-07","public_updated":null,"public_display_date":"2026-04-07","public_sort_date":"2026-04-07","public_period_date":"2026-04-07"},{"id":"BSI:WID-SEC-W-2026-0996","cve":"CVE-2026-35554","title":"Apache Kafka: Schwachstelle ermöglicht Offenlegung von Informationen","date":"2026-04-07","published":"2026-04-07","updated":null,"source_published":"2026-04-07","source_updated":"2026-04-07","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://issues.apache.org/jira/browse/KAFKA-19012","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0996.json","summary":"WID-SEC-W-2026-0996 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0996","summary":"WID-SEC-2026-0996 - Portal Version","category":"self"},{"url":"https://issues.apache.org/jira/browse/KAFKA-19012","summary":"Apache Kafka Issue Tracker KAFKA-19012 vom 2026-04-07","category":"external"},{"url":"https://lists.apache.org/thread/f07x7j8ovyqhjd1to25jsnqbm6wj01d6","summary":"Apache Kafka Users Mailing List vom 2026-04-07","category":"external"}],"severity":"high","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://issues.apache.org/jira/browse/KAFKA-19012","published":"2026-04-07","updated":"2026-04-07","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-08T10:37:35.799Z","sourceUrl":"https://issues.apache.org/jira/browse/KAFKA-19012","added":"2026-04-07T00:00:00.000Z","public_url":"https://issues.apache.org/jira/browse/KAFKA-19012","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-w-2026-0996 cve-2026-35554 apache kafka: schwachstelle ermöglicht offenlegung von informationen bsi bsi","public_published":"2026-04-07","public_updated":null,"public_display_date":"2026-04-07","public_sort_date":"2026-04-07","public_period_date":"2026-04-07"},{"id":"BSI:WID-SEC-W-2026-0998","cve":"CVE-2026-28808","title":"Erlang/OTP: Mehrere Schwachstellen","date":"2026-04-07","published":"2026-04-07","updated":null,"source_published":"2026-04-07","source_updated":"2026-04-07","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://github.com/erlang/otp/security/advisories/GHSA-3vhp-h532-mc3f","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0998.json","summary":"WID-SEC-W-2026-0998 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0998","summary":"WID-SEC-2026-0998 - Portal Version","category":"self"},{"url":"https://github.com/erlang/otp/security/advisories/GHSA-3vhp-h532-mc3f","summary":"GitHub Security Advisory GHSA-3vhp-h532-mc3f vom 2026-04-07","category":"external"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2455909","summary":"Red Hat Bugtracker #2455909 vom 2026-04-07","category":"external"},{"url":"https://github.com/erlang/otp/security/advisories/GHSA-v884-5jg5-whj8","summary":"GitHub Security Advisory GHSA-v884-5jg5-whj8 vom 2026-04-07","category":"external"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2455868","summary":"Red Hat Bugtracker #2455868 vom 2026-04-07","category":"external"},{"url":"https://github.com/erlang/otp/security/advisories/GHSA-gxrm-pf64-99xm","summary":"GitHub Security Advisory GHSA-gxrm-pf64-99xm vom 2026-04-07","category":"external"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2455896","summary":"Red Hat Bugtracker #2455896 vom 2026-04-07","category":"external"}],"severity":"high","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://github.com/erlang/otp/security/advisories/GHSA-3vhp-h532-mc3f","published":"2026-04-07","updated":"2026-04-07","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-08T10:37:35.799Z","sourceUrl":"https://github.com/erlang/otp/security/advisories/GHSA-3vhp-h532-mc3f","added":"2026-04-07T00:00:00.000Z","public_url":"https://github.com/erlang/otp/security/advisories/GHSA-3vhp-h532-mc3f","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-w-2026-0998 cve-2026-28808 erlang/otp: mehrere schwachstellen bsi bsi","public_published":"2026-04-07","public_updated":null,"public_display_date":"2026-04-07","public_sort_date":"2026-04-07","public_period_date":"2026-04-07"},{"id":"BSI:WID-SEC-W-2026-1005","cve":"CVE-2026-39398","title":"OpenClaw: Mehrere Schwachstellen","date":"2026-04-07","published":"2026-04-07","updated":null,"source_published":"2026-04-07","source_updated":"2026-04-07","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-cmfr-9m2r-xwhq","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1005.json","summary":"WID-SEC-W-2026-1005 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1005","summary":"WID-SEC-2026-1005 - Portal Version","category":"self"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-cmfr-9m2r-xwhq","summary":"GitHub Security Advisory GHSA-cmfr-9m2r-xwhq vom 2026-04-07","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-67mf-f936-ppxf","summary":"GitHub Security Advisory GHSA-67mf-f936-ppxf vom 2026-04-07","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-25wv-8phj-8p7r","summary":"GitHub Security Advisory GHSA-25wv-8phj-8p7r vom 2026-04-07","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-3vvq-q2qc-7rmp","summary":"GitHub Security Advisory GHSA-3vvq-q2qc-7rmp vom 2026-04-07","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-5h3f-885m-v22w","summary":"GitHub Security Advisory GHSA-5h3f-885m-v22w vom 2026-04-07","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-5wj5-87vq-39xm","summary":"GitHub Security Advisory GHSA-5wj5-87vq-39xm vom 2026-04-07","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-68x5-xx89-w9mm","summary":"GitHub Security Advisory GHSA-68x5-xx89-w9mm vom 2026-04-07","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-7437-7hg8-frrw","summary":"GitHub Security Advisory GHSA-7437-7hg8-frrw vom 2026-04-07","category":"external"},{"url":"https://github.com/advisories/GHSA-7853-gqqm-vcwx","summary":"GitHub Security Advisory GHSA-7853-gqqm-vcwx vom 2026-04-07","category":"external"},{"url":"https://github.com/advisories/GHSA-83f3-hh45-vfw9","summary":"GitHub Security Advisory GHSA-83f3-hh45-vfw9 vom 2026-04-07","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-ccx3-fw7q-rr2r","summary":"GitHub Security Advisory GHSA-ccx3-fw7q-rr2r vom 2026-04-07","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-cm8v-2vh9-cxf3","summary":"GitHub Security Advisory GHSA-cm8v-2vh9-cxf3 vom 2026-04-07","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-jf56-mccx-5f3f","summary":"GitHub Security Advisory GHSA-jf56-mccx-5f3f vom 2026-04-07","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-q2gc-xjqw-qp89","summary":"GitHub Security Advisory GHSA-q2gc-xjqw-qp89 vom 2026-04-07","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-qqq7-4hxc-x63c","summary":"GitHub Security Advisory GHSA-qqq7-4hxc-x63c vom 2026-04-07","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-vc32-h5mq-453v","summary":"GitHub Security Advisory GHSA-vc32-h5mq-453v vom 2026-04-07","category":"external"},{"url":"https://github.com/advisories/GHSA-vfw7-6rhc-6xxg","summary":"GitHub Security Advisory GHSA-vfw7-6rhc-6xxg vom 2026-04-07","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-vr5g-mmx7-h897","summary":"GitHub Security Advisory GHSA-vr5g-mmx7-h897 vom 2026-04-07","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-w8g9-x8gx-crmm","summary":"GitHub Security Advisory GHSA-w8g9-x8gx-crmm vom 2026-04-07","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-w9j9-w4cp-6wgr","summary":"GitHub Security Advisory GHSA-w9j9-w4cp-6wgr vom 2026-04-07","category":"external"},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-whf9-3hcx-gq54","summary":"GitHub Security Advisory GHSA-whf9-3hcx-gq54 vom 2026-04-07","category":"external"},{"url":"https://github.com/advisories/GHSA-wpc6-37g7-8q4w","summary":"GitHub Security Advisory GHSA-wpc6-37g7-8q4w vom 2026-04-07","category":"external"}],"severity":"high","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-cmfr-9m2r-xwhq","published":"2026-04-07","updated":"2026-04-07","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-09T06:00:53.683Z","sourceUrl":"https://github.com/openclaw/openclaw/security/advisories/GHSA-cmfr-9m2r-xwhq","added":"2026-04-07T00:00:00.000Z","public_url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-cmfr-9m2r-xwhq","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-w-2026-1005 cve-2026-39398 openclaw: mehrere schwachstellen bsi bsi","public_published":"2026-04-07","public_updated":null,"public_display_date":"2026-04-07","public_sort_date":"2026-04-07","public_period_date":"2026-04-07"},{"id":"BSI:WID-SEC-W-2026-1006","cve":"CVE-2026-27140","title":"Golang Go: Mehrere Schwachstellen","date":"2026-04-07","published":"2026-04-07","updated":null,"source_published":"2026-04-07","source_updated":"2026-04-07","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1006.json","summary":"WID-SEC-W-2026-1006 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1006","summary":"WID-SEC-2026-1006 - Portal Version","category":"self"},{"url":"https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU","summary":"Go 1.26.2 and Go 1.25.9 releases vom 2026-04-07","category":"external"}],"severity":"high","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU","published":"2026-04-07","updated":"2026-04-07","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-09T06:00:53.683Z","sourceUrl":"https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU","added":"2026-04-07T00:00:00.000Z","public_url":"https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-w-2026-1006 cve-2026-27140 golang go: mehrere schwachstellen bsi bsi","public_published":"2026-04-07","public_updated":null,"public_display_date":"2026-04-07","public_sort_date":"2026-04-07","public_period_date":"2026-04-07"},{"id":"BSI:WID-SEC-W-2026-1007","cve":"CVE-2025-14550","title":"IBM App Connect Enterprise: Mehrere Schwachstellen","date":"2026-04-07","published":"2026-04-07","updated":null,"source_published":"2026-04-07","source_updated":"2026-04-07","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://www.ibm.com/support/pages/node/7268737","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1007.json","summary":"WID-SEC-W-2026-1007 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1007","summary":"WID-SEC-2026-1007 - Portal Version","category":"self"},{"url":"https://www.ibm.com/support/pages/node/7268737","summary":"IBM Security Bulletin 7268737 vom 2026-04-07","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7268738","summary":"IBM Security Bulletin 7268738 vom 2026-04-07","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7268740","summary":"IBM Security Bulletin 7268740 vom 2026-04-07","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7268741","summary":"IBM Security Bulletin 7268741 vom 2026-04-07","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7268743","summary":"IBM Security Bulletin 7268743 vom 2026-04-07","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7268744","summary":"IBM Security Bulletin 7268744 vom 2026-04-07","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7268745","summary":"IBM Security Bulletin 7268745 vom 2026-04-07","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7268747","summary":"IBM Security Bulletin 7268747 vom 2026-04-07","category":"external"}],"severity":"high","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://www.ibm.com/support/pages/node/7268737","published":"2026-04-07","updated":"2026-04-07","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-09T06:00:53.683Z","sourceUrl":"https://www.ibm.com/support/pages/node/7268737","added":"2026-04-07T00:00:00.000Z","public_url":"https://www.ibm.com/support/pages/node/7268737","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-w-2026-1007 cve-2025-14550 ibm app connect enterprise: mehrere schwachstellen bsi bsi","public_published":"2026-04-07","public_updated":null,"public_display_date":"2026-04-07","public_sort_date":"2026-04-07","public_period_date":"2026-04-07"},{"id":"BSI:WID-SEC-W-2026-1009","cve":"CVE-2026-27314","title":"Apache Cassandra: Mehrere Schwachstellen","date":"2026-04-07","published":"2026-04-07","updated":null,"source_published":"2026-04-07","source_updated":"2026-04-07","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://github.com/advisories/GHSA-qxpc-96fq-wwmg","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1009.json","summary":"WID-SEC-W-2026-1009 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1009","summary":"WID-SEC-2026-1009 - Portal Version","category":"self"},{"url":"https://github.com/advisories/GHSA-qxpc-96fq-wwmg","summary":"GitHub Security Advisory GHSA-qxpc-96fq-wwmg vom 2026-04-07","category":"external"},{"url":"https://seclists.org/oss-sec/2026/q2/32","summary":"Mailing List OSS Security - CVE-2026-27314 vom 2026-04-07","category":"external"},{"url":"https://github.com/advisories/GHSA-fh34-c629-p8xj","summary":"GitHub Security Advisory GHSA-fh34-c629-p8xj vom 2026-04-07","category":"external"},{"url":"https://seclists.org/oss-sec/2026/q2/33","summary":"Mailing List OSS Security - CVE-2026-27315 vom 2026-04-07","category":"external"},{"url":"https://github.com/advisories/GHSA-qffm-gf3j-6mvg","summary":"GitHub Security Advisory GHSA-qffm-gf3j-6mvg vom 2026-04-07","category":"external"},{"url":"https://seclists.org/oss-sec/2026/q2/34","summary":"Mailing List OSS Security - CVE-2026-32588 vom 2026-04-07","category":"external"}],"severity":"high","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://github.com/advisories/GHSA-qxpc-96fq-wwmg","published":"2026-04-07","updated":"2026-04-07","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-09T06:00:53.683Z","sourceUrl":"https://github.com/advisories/GHSA-qxpc-96fq-wwmg","added":"2026-04-07T00:00:00.000Z","public_url":"https://github.com/advisories/GHSA-qxpc-96fq-wwmg","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-w-2026-1009 cve-2026-27314 apache cassandra: mehrere schwachstellen bsi bsi","public_published":"2026-04-07","public_updated":null,"public_display_date":"2026-04-07","public_sort_date":"2026-04-07","public_period_date":"2026-04-07"},{"id":"BSI:WID-SEC-W-2026-0628","cve":"CVE-2026-29059","title":"Nextcloud Flow: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten","date":"2026-03-05","published":"2026-03-05","updated":"2026-04-06","source_published":"2026-03-05","source_updated":"2026-04-06","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g7vj-98x3-qvjf","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0628.json","summary":"WID-SEC-W-2026-0628 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0628","summary":"WID-SEC-2026-0628 - Portal Version","category":"self"},{"url":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g7vj-98x3-qvjf","summary":"NextCloud Security Advisory vom 2026-03-05","category":"external"},{"url":"https://github.com/Chocapikk/Windfall","summary":"Windfall exploit chain vom 2026-04-06","category":"external"}],"severity":"critical","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g7vj-98x3-qvjf","published":"2026-03-05","updated":"2026-04-06","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-08T09:00:52.459Z","sourceUrl":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g7vj-98x3-qvjf","added":"2026-04-06T00:00:00.000Z","public_url":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g7vj-98x3-qvjf","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"critical","search_text":"bsi:wid-sec-w-2026-0628 cve-2026-29059 nextcloud flow: schwachstelle ermöglicht ausführen von beliebigem programmcode mit administratorrechten bsi bsi","public_published":"2026-03-05","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06"},{"id":"BSI:WID-SEC-W-2026-0789","cve":"CVE-2026-35537","title":"Roundcube: Mehrere Schwachstellen","date":"2026-03-18","published":"2026-03-18","updated":"2026-04-06","source_published":"2026-03-18","source_updated":"2026-04-06","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://roundcube.net/news/2026/03/18/security-updates-1.7-rc5-1.6.14-1.5.14","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0789.json","summary":"WID-SEC-W-2026-0789 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0789","summary":"WID-SEC-2026-0789 - Portal Version","category":"self"},{"url":"https://roundcube.net/news/2026/03/18/security-updates-1.7-rc5-1.6.14-1.5.14","summary":"Roundcube Security updates 1.7-rc5, 1.6.14 and 1.5.14 vom 2026-03-18","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://roundcube.net/news/2026/03/18/security-updates-1.7-rc5-1.6.14-1.5.14","published":"2026-03-18","updated":"2026-04-06","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-07T09:01:29.157Z","sourceUrl":"https://roundcube.net/news/2026/03/18/security-updates-1.7-rc5-1.6.14-1.5.14","added":"2026-04-06T00:00:00.000Z","public_url":"https://roundcube.net/news/2026/03/18/security-updates-1.7-rc5-1.6.14-1.5.14","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-w-2026-0789 cve-2026-35537 roundcube: mehrere schwachstellen bsi bsi","public_published":"2026-03-18","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06"},{"id":"BSI:WID-SEC-W-2026-0983","cve":"CVE-2025-39666","title":"Checkmk: Mehrere Schwachstellen","date":"2026-04-06","published":"2026-04-06","updated":null,"source_published":"2026-04-06","source_updated":"2026-04-06","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://checkmk.com/werk/18891","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0983.json","summary":"WID-SEC-W-2026-0983 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0983","summary":"WID-SEC-2026-0983 - Portal Version","category":"self"},{"url":"https://checkmk.com/werk/18891","summary":"CheckMK Werk  18891 vom 2026-04-06","category":"external"},{"url":"https://checkmk.com/werk/19033","summary":"CheckMK Werk  19033 vom 2026-04-06","category":"external"}],"severity":"high","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://checkmk.com/werk/18891","published":"2026-04-06","updated":"2026-04-06","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-08T09:00:52.459Z","sourceUrl":"https://checkmk.com/werk/18891","added":"2026-04-06T00:00:00.000Z","public_url":"https://checkmk.com/werk/18891","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"high","search_text":"bsi:wid-sec-w-2026-0983 cve-2025-39666 checkmk: mehrere schwachstellen bsi bsi","public_published":"2026-04-06","public_updated":null,"public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06"},{"id":"BSI:WID-SEC-W-2026-0984","cve":"CVE-2026-24511","title":"Dell PowerScale OneFS: Mehrere Schwachstellen","date":"2026-04-06","published":"2026-04-06","updated":null,"source_published":"2026-04-06","source_updated":"2026-04-06","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://www.dell.com/support/kbdoc/000449337","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0984.json","summary":"WID-SEC-W-2026-0984 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0984","summary":"WID-SEC-2026-0984 - Portal Version","category":"self"},{"url":"https://www.dell.com/support/kbdoc/000449337","summary":"Dell Security Advisory vom 2026-04-06","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://www.dell.com/support/kbdoc/000449337","published":"2026-04-06","updated":"2026-04-06","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-08T09:00:52.459Z","sourceUrl":"https://www.dell.com/support/kbdoc/000449337","added":"2026-04-06T00:00:00.000Z","public_url":"https://www.dell.com/support/kbdoc/000449337","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-w-2026-0984 cve-2026-24511 dell powerscale onefs: mehrere schwachstellen bsi bsi","public_published":"2026-04-06","public_updated":null,"public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06"},{"id":"BSI:WID-SEC-W-2026-0985","cve":"CVE-2026-23412","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-04-06","published":"2026-04-06","updated":null,"source_published":"2026-04-06","source_updated":"2026-04-06","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://lore.kernel.org/linux-cve-announce/","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0985.json","summary":"WID-SEC-W-2026-0985 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0985","summary":"WID-SEC-2026-0985 - Portal Version","category":"self"},{"url":"https://lore.kernel.org/linux-cve-announce/","summary":"Kernel CVE Announce Mailingliste","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040201-CVE-2026-23412-4daa@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23412","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040203-CVE-2026-23413-fa13@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23413","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040203-CVE-2026-23414-d0e3@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23414","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040204-CVE-2026-23415-3435@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23415","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040204-CVE-2026-23416-2941@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23416","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040204-CVE-2026-23417-d6a2@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23417","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040301-CVE-2026-23418-3cf7@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23418","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040303-CVE-2026-23419-6055@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23419","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040303-CVE-2026-23420-c110@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23420","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040304-CVE-2026-23421-dace@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23421","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040304-CVE-2026-23422-1e6f@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23422","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040304-CVE-2026-23423-96fa@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23423","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040305-CVE-2026-23424-7b21@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23424","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040305-CVE-2026-23425-80db@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23425","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040305-CVE-2026-23426-4c05@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23426","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040307-CVE-2026-23427-5456@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23427","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040310-CVE-2026-23428-9e4e@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23428","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040310-CVE-2026-23429-2f24@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23429","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040310-CVE-2026-23430-8d4a@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23430","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040311-CVE-2026-23431-3aee@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23431","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040311-CVE-2026-23432-4aaf@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23432","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040311-CVE-2026-23433-01be@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23433","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040311-CVE-2026-23434-f0f0@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23434","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040312-CVE-2026-23435-e721@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23435","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040312-CVE-2026-23436-f1f8@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23436","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040312-CVE-2026-23437-9787@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23437","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040313-CVE-2026-23438-5faa@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23438","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040313-CVE-2026-23439-ed88@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23439","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040313-CVE-2026-23440-9b9f@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23440","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040313-CVE-2026-23441-b47e@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23441","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040314-CVE-2026-23442-fe23@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23442","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040314-CVE-2026-23443-19e2@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23443","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040314-CVE-2026-23444-8169@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23444","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040315-CVE-2026-23445-d003@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23445","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040315-CVE-2026-23446-65cf@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23446","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040315-CVE-2026-23447-dd25@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23447","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040315-CVE-2026-23448-1d79@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23448","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040316-CVE-2026-23449-1717@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23449","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040316-CVE-2026-23450-2437@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23450","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040316-CVE-2026-23451-1298@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23451","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040317-CVE-2026-23452-4c2b@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23452","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040317-CVE-2026-23453-c4f8@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23453","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040317-CVE-2026-23454-a999@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23454","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040317-CVE-2026-23455-f045@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23455","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040318-CVE-2026-23456-7da2@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23456","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040318-CVE-2026-23457-e7f6@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23457","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040318-CVE-2026-23458-5578@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23458","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040319-CVE-2026-23459-fcfb@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23459","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040319-CVE-2026-23460-f1d1@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23460","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040319-CVE-2026-23461-f03d@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23461","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040319-CVE-2026-23462-297c@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23462","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040320-CVE-2026-23463-e730@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23463","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040320-CVE-2026-23464-840f@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23464","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040320-CVE-2026-23465-9c96@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23465","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040321-CVE-2026-23466-ae2c@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23466","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040321-CVE-2026-23467-9cfe@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23467","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040321-CVE-2026-23468-8be9@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23468","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040322-CVE-2026-23469-fd6a@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23469","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040322-CVE-2026-23470-a491@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23470","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040322-CVE-2026-23471-f1bc@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23471","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040322-CVE-2026-23472-c68c@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23472","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040323-CVE-2026-23473-ab6c@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23473","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040323-CVE-2026-23474-e350@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23474","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040323-CVE-2026-23475-8bf5@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-23475","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040324-CVE-2026-31389-036b@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-31389","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040324-CVE-2026-31390-f363@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-31390","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040324-CVE-2026-31391-4b86@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-31391","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040324-CVE-2026-31392-7952@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-31392","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040325-CVE-2026-31393-5e12@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-31393","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040325-CVE-2026-31394-26ac@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-31394","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040325-CVE-2026-31395-8855@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-31395","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040326-CVE-2026-31396-0dad@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-31396","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040326-CVE-2026-31397-8672@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-31397","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040326-CVE-2026-31398-babe@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-31398","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040326-CVE-2026-31399-9b84@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-31399","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040327-CVE-2026-31400-db79@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-31400","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040327-CVE-2026-31401-697d@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-31401","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040327-CVE-2026-31402-3e6a@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-31402","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040328-CVE-2026-31403-5446@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-31403","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040328-CVE-2026-31404-f58a@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-31404","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040603-CVE-2026-31405-8cfb@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-31405","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040628-CVE-2026-31406-e2f3@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-31406","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040628-CVE-2026-31407-6abd@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-31407","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040629-CVE-2026-31408-9f0f@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-31408","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040629-CVE-2026-31409-d22c@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-31409","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2026040629-CVE-2026-31410-5b44@gregkh/","summary":"Linux Kernel CVE Announcement CVE-2026-31410","category":"external"},{"url":"https://msrc.microsoft.com/update-guide/","summary":"Microsoft Leitfaden für Sicherheitsupdates vom 2026-04-07","category":"external"},{"url":"https://github.com/bluedragonsecurity/CVE-2026-23416-POC","summary":"CVE-2026-23416 PoC","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://lore.kernel.org/linux-cve-announce/","published":"2026-04-06","updated":"2026-04-06","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"fastlane_seen_at":"2026-04-08T09:00:52.459Z","sourceUrl":"https://lore.kernel.org/linux-cve-announce/","added":"2026-04-06T00:00:00.000Z","public_url":"https://lore.kernel.org/linux-cve-announce/","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-w-2026-0985 cve-2026-23412 linux kernel: mehrere schwachstellen bsi bsi","public_published":"2026-04-06","public_updated":null,"public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06"},{"id":"CVE-2025-49010","cve":"CVE-2025-49010","title":"OpenSC: Stack-buffer-overflow WRITE in GET RESPONSE","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-10","date":"2026-03-10","updated":"2026-04-06","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49010","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49010","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49010","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-13T04:00:39.664Z","status_ok":true,"source_kind":"vendor","confidence":0.92}],"exploited":false,"severity":"low","cvss":3.8,"cve_published":null,"cve_updated":null,"published_at":"2026-03-10","updated_at":"2026-04-06","link_checked_at":"2026-04-13T04:00:39.664Z","sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49010","added":"2026-04-01T09:01:05.879Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49010","public_source":"MSRC","public_source_slug":"msrc","public_published":"2026-03-10","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-49010 cve-2025-49010 opensc: stack-buffer-overflow write in get response microsoft msrc msrc"},{"id":"CVE-2025-66038","cve":"CVE-2025-66038","title":"OpenSC: `sc_compacttlv_find_tag` can return out-of-bounds pointers","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-10","date":"2026-03-10","updated":"2026-04-06","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-66038","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-66038","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-66038","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-13T04:00:39.664Z","status_ok":true,"source_kind":"vendor","confidence":0.92}],"exploited":false,"severity":"low","cvss":3.9,"cve_published":null,"cve_updated":null,"published_at":"2026-03-10","updated_at":"2026-04-06","link_checked_at":"2026-04-13T04:00:39.664Z","sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-66038","added":"2026-04-01T09:01:05.879Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-66038","public_source":"MSRC","public_source_slug":"msrc","public_published":"2026-03-10","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-66038 cve-2025-66038 opensc: `sc_compacttlv_find_tag` can return out-of-bounds pointers microsoft msrc msrc"},{"id":"CVE-2025-66215","cve":"CVE-2025-66215","title":"OpenSC: Stack-buffer-overflow WRITE in card-oberthur","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-10","date":"2026-03-10","updated":"2026-04-06","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-66215","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-66215","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-66215","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-13T04:00:39.664Z","status_ok":true,"source_kind":"vendor","confidence":0.92}],"exploited":false,"severity":"low","cvss":3.8,"cve_published":null,"cve_updated":null,"published_at":"2026-03-10","updated_at":"2026-04-06","link_checked_at":"2026-04-13T04:00:39.664Z","sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-66215","added":"2026-04-01T09:01:05.879Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-66215","public_source":"MSRC","public_source_slug":"msrc","public_published":"2026-03-10","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-66215 cve-2025-66215 opensc: stack-buffer-overflow write in card-oberthur microsoft msrc msrc"},{"id":"CVE-2025-69720","cve":"CVE-2025-69720","title":"Mariner","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-10","date":"2026-03-10","updated":"2026-04-06","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-69720","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-69720","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-69720","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-13T04:00:39.664Z","status_ok":true,"source_kind":"vendor","confidence":0.92}],"exploited":false,"severity":"critical","cvss":9.8,"cve_published":null,"cve_updated":null,"published_at":"2026-03-10","updated_at":"2026-04-06","link_checked_at":"2026-04-13T04:00:39.664Z","sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-69720","added":"2026-03-25T07:49:16.388Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-69720","public_source":"MSRC","public_source_slug":"msrc","public_published":"2026-03-10","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2025-69720 cve-2025-69720 mariner microsoft msrc msrc"},{"id":"CVE-2026-0385","cve":"CVE-2026-0385","title":"Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-10","date":"2026-03-10","updated":"2026-04-06","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-0385","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-0385","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-0385","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-13T04:00:41.123Z","status_ok":true,"source_kind":"vendor","confidence":0.92}],"exploited":false,"severity":"medium","cvss":5,"cve_published":null,"cve_updated":null,"published_at":"2026-03-10","updated_at":"2026-04-06","link_checked_at":"2026-04-13T04:00:41.123Z","sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-0385","added":"2026-03-14T00:01:21.223Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-0385","public_source":"MSRC","public_source_slug":"msrc","public_published":"2026-03-10","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2026-0385 cve-2026-0385 microsoft edge (chromium-based) for android spoofing vulnerability microsoft msrc msrc"},{"id":"CVE-2026-0964","cve":"CVE-2026-0964","title":"Libssh: improper sanitation of paths received from scp servers","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-10","date":"2026-03-10","updated":"2026-04-06","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-0964","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-0964","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-0964","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-13T04:00:41.123Z","status_ok":true,"source_kind":"vendor","confidence":0.92}],"exploited":false,"severity":"medium","cvss":5,"cve_published":null,"cve_updated":null,"published_at":"2026-03-10","updated_at":"2026-04-06","link_checked_at":"2026-04-13T04:00:41.123Z","sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-0964","added":"2026-03-31T09:00:51.560Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-0964","public_source":"MSRC","public_source_slug":"msrc","public_published":"2026-03-10","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2026-0964 cve-2026-0964 libssh: improper sanitation of paths received from scp servers microsoft msrc msrc"},{"id":"CVE-2026-0966","cve":"CVE-2026-0966","title":"Libssh: buffer underflow in ssh_get_hexa() on invalid input","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-10","date":"2026-03-10","updated":"2026-04-06","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-0966","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-0966","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-0966","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-13T04:00:41.123Z","status_ok":true,"source_kind":"vendor","confidence":0.92}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2026-03-10","updated_at":"2026-04-06","link_checked_at":"2026-04-13T04:00:41.123Z","sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-0966","added":"2026-03-31T09:00:51.560Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-0966","public_source":"MSRC","public_source_slug":"msrc","public_published":"2026-03-10","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2026-0966 cve-2026-0966 libssh: buffer underflow in ssh_get_hexa() on invalid input microsoft msrc msrc"},{"id":"CVE-2026-0967","cve":"CVE-2026-0967","title":"Libssh: libssh: denial of service via inefficient regular expression processing","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-10","date":"2026-03-10","updated":"2026-04-06","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-0967","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-0967","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-0967","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-13T04:00:41.123Z","status_ok":true,"source_kind":"vendor","confidence":0.92}],"exploited":false,"severity":"low","cvss":2.2,"cve_published":null,"cve_updated":null,"published_at":"2026-03-10","updated_at":"2026-04-06","link_checked_at":"2026-04-13T04:00:41.123Z","sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-0967","added":"2026-03-31T09:00:51.560Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-0967","public_source":"MSRC","public_source_slug":"msrc","public_published":"2026-03-10","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2026-0967 cve-2026-0967 libssh: libssh: denial of service via inefficient regular expression processing microsoft msrc msrc"},{"id":"CVE-2026-1519","cve":"CVE-2026-1519","title":"Excessive NSEC3 iterations cause high CPU load during insecure delegation validation","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-10","date":"2026-03-10","updated":"2026-04-06","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-1519","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-1519","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-1519","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-13T04:00:41.123Z","status_ok":true,"source_kind":"vendor","confidence":0.92}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2026-03-10","updated_at":"2026-04-06","link_checked_at":"2026-04-13T04:00:41.123Z","sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-1519","added":"2026-03-29T09:01:09.352Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-1519","public_source":"MSRC","public_source_slug":"msrc","public_published":"2026-03-10","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2026-1519 cve-2026-1519 excessive nsec3 iterations cause high cpu load during insecure delegation validation microsoft msrc msrc"},{"id":"CVE-2026-2100","cve":"CVE-2026-2100","title":"P11-kit: p11-kit: null dereference via c_derivekey with specific null parameters","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-26","date":"2026-03-26","updated":"2026-04-06","date_basis":"msrc_cve","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://www.cve.org/CVERecord?id=CVE-2026-2100","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-2100","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-2100","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-13T04:00:43.298Z","status_ok":null,"source_kind":"vendor","confidence":0.92},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-2100","published":"2026-03-26","updated":"2026-04-06","checked_at":"2026-04-13T04:00:43.298Z","status_ok":true,"source_kind":"msrc_cve","confidence":0.99}],"exploited":false,"severity":"medium","cvss":5.3,"cve_published":"2026-03-26","cve_updated":"2026-03-26","published_at":"2026-03-26","updated_at":null,"link_checked_at":"2026-04-13T04:00:43.298Z","sourceUrl":"https://www.cve.org/CVERecord?id=CVE-2026-2100","added":"2026-04-02T09:00:57.862Z","public_url":"https://www.cve.org/CVERecord?id=CVE-2026-2100","public_source":"CVE","public_source_slug":"cve","public_published":"2026-03-26","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2026-2100 cve-2026-2100 p11-kit: p11-kit: null dereference via c_derivekey with specific null parameters microsoft cve msrc","source_url_repaired_from":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-2100","source_date":"2026-03-10"},{"id":"CVE-2026-21710","cve":"CVE-2026-21710","title":"Mariner","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-10","date":"2026-03-10","updated":"2026-04-06","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21710","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21710","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21710","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-13T04:00:41.123Z","status_ok":true,"source_kind":"vendor","confidence":0.92}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2026-03-10","updated_at":"2026-04-06","link_checked_at":"2026-04-13T04:00:41.123Z","sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21710","added":"2026-04-01T09:01:05.879Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21710","public_source":"MSRC","public_source_slug":"msrc","public_published":"2026-03-10","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2026-21710 cve-2026-21710 mariner microsoft msrc msrc"},{"id":"CVE-2026-21713","cve":"CVE-2026-21713","title":"Mariner","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-10","date":"2026-03-10","updated":"2026-04-06","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21713","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21713","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21713","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-13T04:00:45.325Z","status_ok":true,"source_kind":"vendor","confidence":0.92}],"exploited":false,"severity":"medium","cvss":5.9,"cve_published":null,"cve_updated":null,"published_at":"2026-03-10","updated_at":"2026-04-06","link_checked_at":"2026-04-13T04:00:45.325Z","sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21713","added":"2026-04-01T09:01:05.879Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21713","public_source":"MSRC","public_source_slug":"msrc","public_published":"2026-03-10","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2026-21713 cve-2026-21713 mariner microsoft msrc msrc"},{"id":"CVE-2026-21716","cve":"CVE-2026-21716","title":"Mariner","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-10","date":"2026-03-10","updated":"2026-04-06","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21716","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21716","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21716","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-13T04:00:45.325Z","status_ok":true,"source_kind":"vendor","confidence":0.92}],"exploited":false,"severity":"low","cvss":3.3,"cve_published":null,"cve_updated":null,"published_at":"2026-03-10","updated_at":"2026-04-06","link_checked_at":"2026-04-13T04:00:45.325Z","sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21716","added":"2026-04-01T09:01:05.879Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21716","public_source":"MSRC","public_source_slug":"msrc","public_published":"2026-03-10","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2026-21716 cve-2026-21716 mariner microsoft msrc msrc"},{"id":"CVE-2026-23279","cve":"CVE-2026-23279","title":"wifi: mac80211: fix NULL pointer dereference in mesh_rx_csa_frame()","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-10","date":"2026-03-10","updated":"2026-04-06","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23279","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23279","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23279","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-13T04:00:45.325Z","status_ok":true,"source_kind":"vendor","confidence":0.92}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2026-03-10","updated_at":"2026-04-06","link_checked_at":"2026-04-13T04:00:45.325Z","sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23279","added":"2026-03-26T08:28:51.140Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23279","public_source":"MSRC","public_source_slug":"msrc","public_published":"2026-03-10","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2026-23279 cve-2026-23279 wifi: mac80211: fix null pointer dereference in mesh_rx_csa_frame() microsoft msrc msrc"},{"id":"CVE-2026-23281","cve":"CVE-2026-23281","title":"wifi: libertas: fix use-after-free in lbs_free_adapter()","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-10","date":"2026-03-10","updated":"2026-04-06","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23281","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23281","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23281","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-13T04:00:48.354Z","status_ok":true,"source_kind":"vendor","confidence":0.92}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-03-10","updated_at":"2026-04-06","link_checked_at":"2026-04-13T04:00:48.354Z","sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23281","added":"2026-03-26T08:28:51.140Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23281","public_source":"MSRC","public_source_slug":"msrc","public_published":"2026-03-10","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2026-23281 cve-2026-23281 wifi: libertas: fix use-after-free in lbs_free_adapter() microsoft msrc msrc"},{"id":"CVE-2026-23285","cve":"CVE-2026-23285","title":"drbd: fix null-pointer dereference on local read error","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-10","date":"2026-03-10","updated":"2026-04-06","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23285","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23285","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23285","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-13T04:00:48.354Z","status_ok":true,"source_kind":"vendor","confidence":0.92}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2026-03-10","updated_at":"2026-04-06","link_checked_at":"2026-04-13T04:00:48.354Z","sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23285","added":"2026-03-26T08:28:51.140Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23285","public_source":"MSRC","public_source_slug":"msrc","public_published":"2026-03-10","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2026-23285 cve-2026-23285 drbd: fix null-pointer dereference on local read error microsoft msrc msrc"},{"id":"CVE-2026-23286","cve":"CVE-2026-23286","title":"atm: lec: fix null-ptr-deref in lec_arp_clear_vccs","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-10","date":"2026-03-10","updated":"2026-04-06","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23286","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23286","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23286","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-13T04:00:48.354Z","status_ok":true,"source_kind":"vendor","confidence":0.92}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2026-03-10","updated_at":"2026-04-06","link_checked_at":"2026-04-13T04:00:48.354Z","sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23286","added":"2026-03-26T08:28:51.140Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23286","public_source":"MSRC","public_source_slug":"msrc","public_published":"2026-03-10","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2026-23286 cve-2026-23286 atm: lec: fix null-ptr-deref in lec_arp_clear_vccs microsoft msrc msrc"},{"id":"CVE-2026-23287","cve":"CVE-2026-23287","title":"irqchip/sifive-plic: Fix frozen interrupt due to affinity setting","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-25","date":"2026-03-25","updated":"2026-04-06","date_basis":"msrc_cve","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://www.cve.org/CVERecord?id=CVE-2026-23287","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23287","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23287","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-13T04:00:50.340Z","status_ok":null,"source_kind":"vendor","confidence":0.92},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-23287","published":"2026-03-25","updated":"2026-04-06","checked_at":"2026-04-13T04:00:50.340Z","status_ok":true,"source_kind":"msrc_cve","confidence":0.99}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":"2026-03-25","cve_updated":"2026-03-25","published_at":"2026-03-25","updated_at":null,"link_checked_at":"2026-04-13T04:00:50.340Z","sourceUrl":"https://www.cve.org/CVERecord?id=CVE-2026-23287","added":"2026-03-26T08:28:51.140Z","public_url":"https://www.cve.org/CVERecord?id=CVE-2026-23287","public_source":"CVE","public_source_slug":"cve","public_published":"2026-03-25","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2026-23287 cve-2026-23287 irqchip/sifive-plic: fix frozen interrupt due to affinity setting microsoft cve msrc","source_url_repaired_from":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23287","source_date":"2026-03-10"},{"id":"CVE-2026-23289","cve":"CVE-2026-23289","title":"IB/mthca: Add missed mthca_unmap_user_db() for mthca_create_srq()","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-10","date":"2026-03-10","updated":"2026-04-06","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23289","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23289","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23289","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-13T04:00:51.061Z","status_ok":true,"source_kind":"vendor","confidence":0.92}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2026-03-10","updated_at":"2026-04-06","link_checked_at":"2026-04-13T04:00:51.061Z","sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23289","added":"2026-03-26T08:28:51.140Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23289","public_source":"MSRC","public_source_slug":"msrc","public_published":"2026-03-10","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2026-23289 cve-2026-23289 ib/mthca: add missed mthca_unmap_user_db() for mthca_create_srq() microsoft msrc msrc"},{"id":"CVE-2026-23290","cve":"CVE-2026-23290","title":"net: usb: pegasus: validate USB endpoints","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-10","date":"2026-03-10","updated":"2026-04-06","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23290","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23290","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23290","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-13T04:00:51.061Z","status_ok":true,"source_kind":"vendor","confidence":0.92}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2026-03-10","updated_at":"2026-04-06","link_checked_at":"2026-04-13T04:00:51.061Z","sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23290","added":"2026-03-26T08:28:51.140Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23290","public_source":"MSRC","public_source_slug":"msrc","public_published":"2026-03-10","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2026-23290 cve-2026-23290 net: usb: pegasus: validate usb endpoints microsoft msrc msrc"},{"id":"CVE-2026-23291","cve":"CVE-2026-23291","title":"nfc: pn533: properly drop the usb interface reference on disconnect","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-10","date":"2026-03-10","updated":"2026-04-06","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23291","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23291","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23291","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-13T04:00:51.061Z","status_ok":true,"source_kind":"vendor","confidence":0.92}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2026-03-10","updated_at":"2026-04-06","link_checked_at":"2026-04-13T04:00:51.061Z","sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23291","added":"2026-03-26T08:28:51.140Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23291","public_source":"MSRC","public_source_slug":"msrc","public_published":"2026-03-10","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2026-23291 cve-2026-23291 nfc: pn533: properly drop the usb interface reference on disconnect microsoft msrc msrc"},{"id":"CVE-2026-23292","cve":"CVE-2026-23292","title":"scsi: target: Fix recursive locking in __configfs_open_file()","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-10","date":"2026-03-10","updated":"2026-04-06","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23292","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23292","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23292","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-13T04:00:51.061Z","status_ok":true,"source_kind":"vendor","confidence":0.92}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2026-03-10","updated_at":"2026-04-06","link_checked_at":"2026-04-13T04:00:51.061Z","sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23292","added":"2026-03-26T08:28:51.140Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23292","public_source":"MSRC","public_source_slug":"msrc","public_published":"2026-03-10","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2026-23292 cve-2026-23292 scsi: target: fix recursive locking in __configfs_open_file() microsoft msrc msrc"},{"id":"CVE-2026-23296","cve":"CVE-2026-23296","title":"scsi: core: Fix refcount leak for tagset_refcnt","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-10","date":"2026-03-10","updated":"2026-04-06","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23296","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23296","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23296","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-13T04:00:52.738Z","status_ok":true,"source_kind":"vendor","confidence":0.92}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2026-03-10","updated_at":"2026-04-06","link_checked_at":"2026-04-13T04:00:52.738Z","sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23296","added":"2026-03-26T08:28:51.140Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23296","public_source":"MSRC","public_source_slug":"msrc","public_published":"2026-03-10","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2026-23296 cve-2026-23296 scsi: core: fix refcount leak for tagset_refcnt microsoft msrc msrc"},{"id":"CVE-2026-23302","cve":"CVE-2026-23302","title":"net: annotate data-races around sk-&gt;sk_{data_ready,write_space}","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-25","date":"2026-03-25","updated":"2026-04-06","date_basis":"msrc_cve","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://www.cve.org/CVERecord?id=CVE-2026-23302","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23302","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23302","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-08T20:00:53.057Z","status_ok":null,"source_kind":"vendor","confidence":0.92},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-23302","published":"2026-03-25","updated":"2026-04-06","checked_at":"2026-04-08T20:00:53.057Z","status_ok":true,"source_kind":"msrc_cve","confidence":0.99}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":"2026-03-25","cve_updated":"2026-03-25","published_at":"2026-03-25","updated_at":null,"link_checked_at":"2026-04-08T20:00:53.057Z","sourceUrl":"https://www.cve.org/CVERecord?id=CVE-2026-23302","added":"2026-03-26T08:28:51.140Z","public_url":"https://www.cve.org/CVERecord?id=CVE-2026-23302","public_source":"CVE","public_source_slug":"cve","public_published":"2026-03-25","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2026-23302 cve-2026-23302 net: annotate data-races around sk-&gt;sk_{data_ready,write_space} microsoft cve msrc","source_url_repaired_from":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23302","source_date":"2026-03-10"},{"id":"CVE-2026-23303","cve":"CVE-2026-23303","title":"smb: client: Don't log plaintext credentials in cifs_set_cifscreds","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-10","date":"2026-03-10","updated":"2026-04-06","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23303","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23303","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23303","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-13T04:00:52.738Z","status_ok":true,"source_kind":"vendor","confidence":0.92}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2026-03-10","updated_at":"2026-04-06","link_checked_at":"2026-04-13T04:00:52.738Z","sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23303","added":"2026-03-26T08:28:51.140Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23303","public_source":"MSRC","public_source_slug":"msrc","public_published":"2026-03-10","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2026-23303 cve-2026-23303 smb: client: don't log plaintext credentials in cifs_set_cifscreds microsoft msrc msrc"},{"id":"CVE-2026-23304","cve":"CVE-2026-23304","title":"ipv6: fix NULL pointer deref in ip6_rt_get_dev_rcu()","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-10","date":"2026-03-10","updated":"2026-04-06","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23304","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23304","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23304","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-13T04:00:52.738Z","status_ok":true,"source_kind":"vendor","confidence":0.92}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2026-03-10","updated_at":"2026-04-06","link_checked_at":"2026-04-13T04:00:52.738Z","sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23304","added":"2026-03-26T08:28:51.140Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23304","public_source":"MSRC","public_source_slug":"msrc","public_published":"2026-03-10","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2026-23304 cve-2026-23304 ipv6: fix null pointer deref in ip6_rt_get_dev_rcu() microsoft msrc msrc"},{"id":"CVE-2026-23308","cve":"CVE-2026-23308","title":"pinctrl: equilibrium: fix warning trace on load","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-25","date":"2026-03-25","updated":"2026-04-06","date_basis":"msrc_cve","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://www.cve.org/CVERecord?id=CVE-2026-23308","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23308","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23308","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-08T20:00:50.260Z","status_ok":null,"source_kind":"vendor","confidence":0.92},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-23308","published":"2026-03-25","updated":"2026-04-06","checked_at":"2026-04-08T20:00:50.260Z","status_ok":true,"source_kind":"msrc_cve","confidence":0.99}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":"2026-03-25","cve_updated":"2026-03-25","published_at":"2026-03-25","updated_at":null,"link_checked_at":"2026-04-08T20:00:50.260Z","sourceUrl":"https://www.cve.org/CVERecord?id=CVE-2026-23308","added":"2026-03-26T08:28:51.140Z","public_url":"https://www.cve.org/CVERecord?id=CVE-2026-23308","public_source":"CVE","public_source_slug":"cve","public_published":"2026-03-25","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2026-23308 cve-2026-23308 pinctrl: equilibrium: fix warning trace on load microsoft cve msrc","source_url_repaired_from":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23308","source_date":"2026-03-10"},{"id":"CVE-2026-23310","cve":"CVE-2026-23310","title":"bpf/bonding: reject vlan+srcmac xmit_hash_policy change when XDP is loaded","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-10","date":"2026-03-10","updated":"2026-04-06","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23310","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23310","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23310","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-13T04:00:52.738Z","status_ok":true,"source_kind":"vendor","confidence":0.92}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2026-03-10","updated_at":"2026-04-06","link_checked_at":"2026-04-13T04:00:52.738Z","sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23310","added":"2026-03-26T08:28:51.140Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23310","public_source":"MSRC","public_source_slug":"msrc","public_published":"2026-03-10","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2026-23310 cve-2026-23310 bpf/bonding: reject vlan+srcmac xmit_hash_policy change when xdp is loaded microsoft msrc msrc"},{"id":"CVE-2026-23312","cve":"CVE-2026-23312","title":"net: usb: kaweth: validate USB endpoints","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-10","date":"2026-03-10","updated":"2026-04-06","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23312","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23312","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23312","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-13T04:00:52.738Z","status_ok":true,"source_kind":"vendor","confidence":0.92}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2026-03-10","updated_at":"2026-04-06","link_checked_at":"2026-04-13T04:00:52.738Z","sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23312","added":"2026-03-26T08:28:51.140Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23312","public_source":"MSRC","public_source_slug":"msrc","public_published":"2026-03-10","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2026-23312 cve-2026-23312 net: usb: kaweth: validate usb endpoints microsoft msrc msrc"},{"id":"CVE-2026-23315","cve":"CVE-2026-23315","title":"wifi: mt76: Fix possible oob access in mt76_connac2_mac_write_txwi_80211()","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-10","date":"2026-03-10","updated":"2026-04-06","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23315","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23315","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23315","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-13T04:00:52.738Z","status_ok":true,"source_kind":"vendor","confidence":0.92}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2026-03-10","updated_at":"2026-04-06","link_checked_at":"2026-04-13T04:00:52.738Z","sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23315","added":"2026-03-26T08:28:51.140Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23315","public_source":"MSRC","public_source_slug":"msrc","public_published":"2026-03-10","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2026-23315 cve-2026-23315 wifi: mt76: fix possible oob access in mt76_connac2_mac_write_txwi_80211() microsoft msrc msrc"},{"id":"CVE-2026-23317","cve":"CVE-2026-23317","title":"drm/vmwgfx: Return the correct value in vmw_translate_ptr functions","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-10","date":"2026-03-10","updated":"2026-04-06","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23317","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23317","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23317","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-13T04:00:52.738Z","status_ok":true,"source_kind":"vendor","confidence":0.92}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2026-03-10","updated_at":"2026-04-06","link_checked_at":"2026-04-13T04:00:52.738Z","sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23317","added":"2026-03-26T08:28:51.140Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23317","public_source":"MSRC","public_source_slug":"msrc","public_published":"2026-03-10","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2026-23317 cve-2026-23317 drm/vmwgfx: return the correct value in vmw_translate_ptr functions microsoft msrc msrc"},{"id":"CVE-2026-23318","cve":"CVE-2026-23318","title":"ALSA: usb-audio: Use correct version for UAC3 header validation","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-10","date":"2026-03-10","updated":"2026-04-06","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23318","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23318","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23318","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-13T04:00:52.738Z","status_ok":true,"source_kind":"vendor","confidence":0.92}],"exploited":false,"severity":"high","cvss":7.7,"cve_published":null,"cve_updated":null,"published_at":"2026-03-10","updated_at":"2026-04-06","link_checked_at":"2026-04-13T04:00:52.738Z","sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23318","added":"2026-03-26T08:28:51.140Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23318","public_source":"MSRC","public_source_slug":"msrc","public_published":"2026-03-10","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2026-23318 cve-2026-23318 alsa: usb-audio: use correct version for uac3 header validation microsoft msrc msrc"},{"id":"CVE-2026-23327","cve":"CVE-2026-23327","title":"cxl/mbox: validate payload size before accessing contents in cxl_payload_from_user_allowed()","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-25","date":"2026-03-25","updated":"2026-04-06","date_basis":"msrc_cve","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://www.cve.org/CVERecord?id=CVE-2026-23327","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23327","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23327","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-08T20:00:55.984Z","status_ok":null,"source_kind":"vendor","confidence":0.92},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-23327","published":"2026-03-25","updated":"2026-04-06","checked_at":"2026-04-08T20:00:55.984Z","status_ok":true,"source_kind":"msrc_cve","confidence":0.99}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":"2026-03-25","cve_updated":"2026-03-25","published_at":"2026-03-25","updated_at":null,"link_checked_at":"2026-04-08T20:00:55.984Z","sourceUrl":"https://www.cve.org/CVERecord?id=CVE-2026-23327","added":"2026-03-26T08:28:51.140Z","public_url":"https://www.cve.org/CVERecord?id=CVE-2026-23327","public_source":"CVE","public_source_slug":"cve","public_published":"2026-03-25","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2026-23327 cve-2026-23327 cxl/mbox: validate payload size before accessing contents in cxl_payload_from_user_allowed() microsoft cve msrc","source_url_repaired_from":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23327","source_date":"2026-03-10"},{"id":"CVE-2026-23330","cve":"CVE-2026-23330","title":"nfc: nci: complete pending data exchange on device close","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-25","date":"2026-03-25","updated":"2026-04-06","date_basis":"msrc_cve","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://www.cve.org/CVERecord?id=CVE-2026-23330","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23330","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23330","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-08T20:00:57.048Z","status_ok":null,"source_kind":"vendor","confidence":0.92},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-23330","published":"2026-03-25","updated":"2026-04-06","checked_at":"2026-04-08T20:00:57.048Z","status_ok":true,"source_kind":"msrc_cve","confidence":0.99}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":"2026-03-25","cve_updated":"2026-03-25","published_at":"2026-03-25","updated_at":null,"link_checked_at":"2026-04-08T20:00:57.048Z","sourceUrl":"https://www.cve.org/CVERecord?id=CVE-2026-23330","added":"2026-03-26T08:28:51.140Z","public_url":"https://www.cve.org/CVERecord?id=CVE-2026-23330","public_source":"CVE","public_source_slug":"cve","public_published":"2026-03-25","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2026-23330 cve-2026-23330 nfc: nci: complete pending data exchange on device close microsoft cve msrc","source_url_repaired_from":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23330","source_date":"2026-03-10"},{"id":"CVE-2026-23334","cve":"CVE-2026-23334","title":"can: usb: f81604: handle short interrupt urb messages properly","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-10","date":"2026-03-10","updated":"2026-04-06","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23334","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23334","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23334","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-13T04:00:52.738Z","status_ok":true,"source_kind":"vendor","confidence":0.92}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2026-03-10","updated_at":"2026-04-06","link_checked_at":"2026-04-13T04:00:52.738Z","sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23334","added":"2026-03-26T08:28:51.140Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23334","public_source":"MSRC","public_source_slug":"msrc","public_published":"2026-03-10","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2026-23334 cve-2026-23334 can: usb: f81604: handle short interrupt urb messages properly microsoft msrc msrc"},{"id":"CVE-2026-23335","cve":"CVE-2026-23335","title":"RDMA/irdma: Fix kernel stack leak in irdma_create_user_ah()","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-25","date":"2026-03-25","updated":"2026-04-06","date_basis":"msrc_cve","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://www.cve.org/CVERecord?id=CVE-2026-23335","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23335","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23335","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-08T20:01:00.515Z","status_ok":null,"source_kind":"vendor","confidence":0.92},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-23335","published":"2026-03-25","updated":"2026-04-06","checked_at":"2026-04-08T20:01:00.515Z","status_ok":true,"source_kind":"msrc_cve","confidence":0.99}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":"2026-03-25","cve_updated":"2026-03-25","published_at":"2026-03-25","updated_at":null,"link_checked_at":"2026-04-08T20:01:00.515Z","sourceUrl":"https://www.cve.org/CVERecord?id=CVE-2026-23335","added":"2026-03-26T08:28:51.140Z","public_url":"https://www.cve.org/CVERecord?id=CVE-2026-23335","public_source":"CVE","public_source_slug":"cve","public_published":"2026-03-25","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2026-23335 cve-2026-23335 rdma/irdma: fix kernel stack leak in irdma_create_user_ah() microsoft cve msrc","source_url_repaired_from":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23335","source_date":"2026-03-10"},{"id":"CVE-2026-23336","cve":"CVE-2026-23336","title":"wifi: cfg80211: cancel rfkill_block work in wiphy_unregister()","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-10","date":"2026-03-10","updated":"2026-04-06","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23336","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23336","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23336","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-13T04:00:52.738Z","status_ok":true,"source_kind":"vendor","confidence":0.92}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2026-03-10","updated_at":"2026-04-06","link_checked_at":"2026-04-13T04:00:52.738Z","sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23336","added":"2026-03-26T08:28:51.140Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23336","public_source":"MSRC","public_source_slug":"msrc","public_published":"2026-03-10","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2026-23336 cve-2026-23336 wifi: cfg80211: cancel rfkill_block work in wiphy_unregister() microsoft msrc msrc"},{"id":"CVE-2026-23339","cve":"CVE-2026-23339","title":"nfc: nci: free skb on nci_transceive early error paths","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-25","date":"2026-03-25","updated":"2026-04-06","date_basis":"msrc_cve","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://www.cve.org/CVERecord?id=CVE-2026-23339","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23339","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23339","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-08T17:30:46.789Z","status_ok":null,"source_kind":"vendor","confidence":0.92},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-23339","published":"2026-03-25","updated":"2026-04-06","checked_at":"2026-04-08T17:30:46.789Z","status_ok":true,"source_kind":"msrc_cve","confidence":0.99}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":"2026-03-25","cve_updated":"2026-03-25","published_at":"2026-03-25","updated_at":null,"link_checked_at":"2026-04-08T17:30:46.789Z","sourceUrl":"https://www.cve.org/CVERecord?id=CVE-2026-23339","added":"2026-03-26T08:28:51.140Z","public_url":"https://www.cve.org/CVERecord?id=CVE-2026-23339","public_source":"CVE","public_source_slug":"cve","public_published":"2026-03-25","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2026-23339 cve-2026-23339 nfc: nci: free skb on nci_transceive early error paths microsoft cve msrc","source_url_repaired_from":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23339","source_date":"2026-03-10"},{"id":"CVE-2026-23346","cve":"CVE-2026-23346","title":"arm64: io: Extract user memory type in ioremap_prot()","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-25","date":"2026-03-25","updated":"2026-04-06","date_basis":"msrc_cve","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://www.cve.org/CVERecord?id=CVE-2026-23346","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23346","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23346","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-08T17:30:46.637Z","status_ok":null,"source_kind":"vendor","confidence":0.92},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-23346","published":"2026-03-25","updated":"2026-04-06","checked_at":"2026-04-08T17:30:46.637Z","status_ok":true,"source_kind":"msrc_cve","confidence":0.99}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":"2026-03-25","cve_updated":"2026-03-25","published_at":"2026-03-25","updated_at":null,"link_checked_at":"2026-04-08T17:30:46.637Z","sourceUrl":"https://www.cve.org/CVERecord?id=CVE-2026-23346","added":"2026-03-26T08:28:51.140Z","public_url":"https://www.cve.org/CVERecord?id=CVE-2026-23346","public_source":"CVE","public_source_slug":"cve","public_published":"2026-03-25","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2026-23346 cve-2026-23346 arm64: io: extract user memory type in ioremap_prot() microsoft cve msrc","source_url_repaired_from":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23346","source_date":"2026-03-10"},{"id":"CVE-2026-23347","cve":"CVE-2026-23347","title":"can: usb: f81604: correctly anchor the urb in the read bulk callback","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-10","date":"2026-03-10","updated":"2026-04-06","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23347","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23347","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23347","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-13T04:00:52.738Z","status_ok":true,"source_kind":"vendor","confidence":0.92}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2026-03-10","updated_at":"2026-04-06","link_checked_at":"2026-04-13T04:00:52.738Z","sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23347","added":"2026-03-26T08:28:51.140Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23347","public_source":"MSRC","public_source_slug":"msrc","public_published":"2026-03-10","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2026-23347 cve-2026-23347 can: usb: f81604: correctly anchor the urb in the read bulk callback microsoft msrc msrc"},{"id":"CVE-2026-23356","cve":"CVE-2026-23356","title":"drbd: fix \"LOGIC BUG\" in drbd_al_begin_io_nonblock()","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-10","date":"2026-03-10","updated":"2026-04-06","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23356","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23356","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23356","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-13T04:00:52.738Z","status_ok":true,"source_kind":"vendor","confidence":0.92}],"exploited":false,"severity":"medium","cvss":6.3,"cve_published":null,"cve_updated":null,"published_at":"2026-03-10","updated_at":"2026-04-06","link_checked_at":"2026-04-13T04:00:52.738Z","sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23356","added":"2026-03-26T08:28:51.140Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23356","public_source":"MSRC","public_source_slug":"msrc","public_published":"2026-03-10","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2026-23356 cve-2026-23356 drbd: fix \"logic bug\" in drbd_al_begin_io_nonblock() microsoft msrc msrc"},{"id":"CVE-2026-23357","cve":"CVE-2026-23357","title":"can: mcp251x: fix deadlock in error path of mcp251x_open","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-10","date":"2026-03-10","updated":"2026-04-06","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23357","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23357","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23357","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-13T04:00:52.738Z","status_ok":true,"source_kind":"vendor","confidence":0.92}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2026-03-10","updated_at":"2026-04-06","link_checked_at":"2026-04-13T04:00:52.738Z","sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23357","added":"2026-03-26T08:28:51.140Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23357","public_source":"MSRC","public_source_slug":"msrc","public_published":"2026-03-10","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2026-23357 cve-2026-23357 can: mcp251x: fix deadlock in error path of mcp251x_open microsoft msrc msrc"},{"id":"CVE-2026-23361","cve":"CVE-2026-23361","title":"PCI: dwc: ep: Flush MSI-X write before unmapping its ATU entry","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-25","date":"2026-03-25","updated":"2026-04-06","date_basis":"msrc_cve","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://www.cve.org/CVERecord?id=CVE-2026-23361","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23361","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23361","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-08T17:30:53.505Z","status_ok":null,"source_kind":"vendor","confidence":0.92},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-23361","published":"2026-03-25","updated":"2026-04-06","checked_at":"2026-04-08T17:30:53.505Z","status_ok":true,"source_kind":"msrc_cve","confidence":0.99}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":"2026-03-25","cve_updated":"2026-03-25","published_at":"2026-03-25","updated_at":null,"link_checked_at":"2026-04-08T17:30:53.505Z","sourceUrl":"https://www.cve.org/CVERecord?id=CVE-2026-23361","added":"2026-03-26T08:28:51.140Z","public_url":"https://www.cve.org/CVERecord?id=CVE-2026-23361","public_source":"CVE","public_source_slug":"cve","public_published":"2026-03-25","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2026-23361 cve-2026-23361 pci: dwc: ep: flush msi-x write before unmapping its atu entry microsoft cve msrc","source_url_repaired_from":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23361","source_date":"2026-03-10"},{"id":"CVE-2026-23364","cve":"CVE-2026-23364","title":"ksmbd: Compare MACs in constant time","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-10","date":"2026-03-10","updated":"2026-04-06","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23364","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23364","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23364","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-13T04:00:52.738Z","status_ok":true,"source_kind":"vendor","confidence":0.92}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2026-03-10","updated_at":"2026-04-06","link_checked_at":"2026-04-13T04:00:52.738Z","sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23364","added":"2026-03-26T08:28:51.140Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23364","public_source":"MSRC","public_source_slug":"msrc","public_published":"2026-03-10","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2026-23364 cve-2026-23364 ksmbd: compare macs in constant time microsoft msrc msrc"},{"id":"CVE-2026-23367","cve":"CVE-2026-23367","title":"wifi: radiotap: reject radiotap with unknown bits","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-10","date":"2026-03-10","updated":"2026-04-06","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23367","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23367","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23367","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-13T04:00:52.738Z","status_ok":true,"source_kind":"vendor","confidence":0.92}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2026-03-10","updated_at":"2026-04-06","link_checked_at":"2026-04-13T04:00:52.738Z","sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23367","added":"2026-03-26T08:28:51.140Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23367","public_source":"MSRC","public_source_slug":"msrc","public_published":"2026-03-10","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2026-23367 cve-2026-23367 wifi: radiotap: reject radiotap with unknown bits microsoft msrc msrc"},{"id":"CVE-2026-23368","cve":"CVE-2026-23368","title":"net: phy: register phy led_triggers during probe to avoid AB-BA deadlock","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-10","date":"2026-03-10","updated":"2026-04-06","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23368","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23368","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23368","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-13T04:00:52.738Z","status_ok":true,"source_kind":"vendor","confidence":0.92}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2026-03-10","updated_at":"2026-04-06","link_checked_at":"2026-04-13T04:00:52.738Z","sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23368","added":"2026-03-26T08:28:51.140Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23368","public_source":"MSRC","public_source_slug":"msrc","public_published":"2026-03-10","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2026-23368 cve-2026-23368 net: phy: register phy led_triggers during probe to avoid ab-ba deadlock microsoft msrc msrc"},{"id":"CVE-2026-23370","cve":"CVE-2026-23370","title":"platform/x86: dell-wmi-sysman: Don't hex dump plaintext password data","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-10","date":"2026-03-10","updated":"2026-04-06","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23370","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23370","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23370","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-13T04:00:52.738Z","status_ok":true,"source_kind":"vendor","confidence":0.92}],"exploited":false,"severity":"medium","cvss":4.4,"cve_published":null,"cve_updated":null,"published_at":"2026-03-10","updated_at":"2026-04-06","link_checked_at":"2026-04-13T04:00:52.738Z","sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23370","added":"2026-03-26T08:28:51.140Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23370","public_source":"MSRC","public_source_slug":"msrc","public_published":"2026-03-10","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2026-23370 cve-2026-23370 platform/x86: dell-wmi-sysman: don't hex dump plaintext password data microsoft msrc msrc"},{"id":"CVE-2026-23379","cve":"CVE-2026-23379","title":"net/sched: ets: fix divide by zero in the offload path","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-10","date":"2026-03-10","updated":"2026-04-06","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23379","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23379","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23379","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-13T04:00:52.738Z","status_ok":true,"source_kind":"vendor","confidence":0.92}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2026-03-10","updated_at":"2026-04-06","link_checked_at":"2026-04-13T04:00:52.738Z","sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23379","added":"2026-03-26T08:28:51.140Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23379","public_source":"MSRC","public_source_slug":"msrc","public_published":"2026-03-10","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2026-23379 cve-2026-23379 net/sched: ets: fix divide by zero in the offload path microsoft msrc msrc"},{"id":"CVE-2026-27447","cve":"CVE-2026-27447","title":"OpenPrinting CUPS: Authorization bypass via case-insensitive group-member lookup","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-03","date":"2026-04-03","updated":"2026-04-06","date_basis":"msrc_cve","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://www.cve.org/CVERecord?id=CVE-2026-27447","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27447","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27447","published":"2026-04-14","updated":"2026-04-14","checked_at":"2026-04-16T13:31:20.792Z","status_ok":null,"source_kind":"vendor","confidence":0.9},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-27447","published":"2026-04-03","updated":"2026-04-06","checked_at":"2026-04-16T13:31:20.792Z","status_ok":true,"source_kind":"msrc_cve","confidence":0.99}],"exploited":false,"severity":"medium","cvss":4.8,"cve_published":"2026-04-03","cve_updated":"2026-04-06","link_checked_at":"2026-04-16T13:31:20.792Z","published_at":"2026-04-03","updated_at":"2026-04-06","sourceUrl":"https://www.cve.org/CVERecord?id=CVE-2026-27447","added":"2026-04-06T00:00:00.000Z","public_url":"https://www.cve.org/CVERecord?id=CVE-2026-27447","public_source":"CVE","public_source_slug":"cve","public_published":"2026-04-03","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2026-27447 cve-2026-27447 openprinting cups: authorization bypass via case-insensitive group-member lookup microsoft cve msrc"},{"id":"CVE-2026-34978","cve":"CVE-2026-34978","title":"OpenPrinting CUPS: Path traversal in RSS notify-recipient-uri enables file write outside CacheDir/rss (and clobbering of job.cache)","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-03","date":"2026-04-03","updated":"2026-04-06","date_basis":"msrc_cve","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://www.cve.org/CVERecord?id=CVE-2026-34978","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34978","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34978","published":"2026-04-14","updated":"2026-04-14","checked_at":"2026-04-16T13:31:20.697Z","status_ok":null,"source_kind":"vendor","confidence":0.9},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-34978","published":"2026-04-03","updated":"2026-04-06","checked_at":"2026-04-16T13:31:20.697Z","status_ok":true,"source_kind":"msrc_cve","confidence":0.99}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":"2026-04-03","cve_updated":"2026-04-06","link_checked_at":"2026-04-16T13:31:20.697Z","published_at":"2026-04-03","updated_at":"2026-04-06","sourceUrl":"https://www.cve.org/CVERecord?id=CVE-2026-34978","added":"2026-04-06T00:00:00.000Z","public_url":"https://www.cve.org/CVERecord?id=CVE-2026-34978","public_source":"CVE","public_source_slug":"cve","public_published":"2026-04-03","public_updated":"2026-04-06","public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2026-34978 cve-2026-34978 openprinting cups: path traversal in rss notify-recipient-uri enables file write outside cachedir/rss (and clobbering of job.cache) microsoft cve msrc"},{"id":"CVE:CVE-2026-35616","cve":"CVE-2026-35616","title":"Fortinet FortiClient EMS Improper Access Control Vulnerability","date":"2026-04-06","vendor":"Fortinet","product":"FortiClient EMS","source":"CISA-KEV","cisa_url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog","source_url":"https://nvd.nist.gov/vuln/detail/CVE-2026-35616","severity":"high","ransomware":"Unknown","cvss":null,"exploited":true,"published":"2026-04-06","updated":null,"source_published":"2026-04-06","source_updated":null,"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"candidates":[{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-35616","published":"2026-04-06","updated":"2026-04-06","checked_at":null,"status_ok":null,"source_kind":"nvd","confidence":0.8}],"date_basis":"nvd","link_checked_at":null,"sourceUrl":"https://nvd.nist.gov/vuln/detail/CVE-2026-35616","added":"2026-04-06T00:00:00.000Z","public_url":"https://nvd.nist.gov/vuln/detail/CVE-2026-35616","public_source":"CVE","public_source_slug":"cve","public_published":"2026-04-06","public_updated":null,"public_display_date":"2026-04-06","public_sort_date":"2026-04-06","public_period_date":"2026-04-06","severity_norm":"high","vendor_slug":"fortinet","search_text":"cve:cve-2026-35616 cve-2026-35616 fortinet forticlient ems improper access control vulnerability fortinet forticlient ems cve cisa-kev unknown"},{"id":"CVE-2026-0968","cve":"CVE-2026-0968","title":"Libssh: libssh: denial of service due to malformed sftp message","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-26","date":"2026-03-26","updated":"2026-04-03","date_basis":"msrc_cve","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://www.cve.org/CVERecord?id=CVE-2026-0968","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-0968","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-0968","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-13T04:00:43.148Z","status_ok":null,"source_kind":"vendor","confidence":0.92},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-0968","published":"2026-03-26","updated":"2026-04-03","checked_at":"2026-04-13T04:00:43.148Z","status_ok":true,"source_kind":"msrc_cve","confidence":0.99}],"exploited":false,"severity":"low","cvss":3.1,"cve_published":"2026-03-26","cve_updated":"2026-04-03","published_at":"2026-03-26","updated_at":"2026-04-03","link_checked_at":"2026-04-13T04:00:43.148Z","sourceUrl":"https://www.cve.org/CVERecord?id=CVE-2026-0968","added":"2026-04-07T07:37:14.618Z","public_url":"https://www.cve.org/CVERecord?id=CVE-2026-0968","public_source":"CVE","public_source_slug":"cve","vendor_slug":"microsoft","severity_norm":"low","search_text":"cve-2026-0968 cve-2026-0968 libssh: libssh: denial of service due to malformed sftp message microsoft cve msrc","public_published":"2026-03-26","public_updated":"2026-04-03","public_display_date":"2026-04-03","public_sort_date":"2026-04-03","public_period_date":"2026-04-03","source_url_repaired_from":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-0968","source_date":"2026-03-10"},{"id":"CVE-2026-23320","cve":"CVE-2026-23320","title":"usb: gadget: f_ncm: align net_device lifecycle with bind/unbind","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-25","date":"2026-03-25","updated":"2026-04-03","date_basis":"msrc_cve","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://www.cve.org/CVERecord?id=CVE-2026-23320","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23320","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23320","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-08T20:00:57.017Z","status_ok":null,"source_kind":"vendor","confidence":0.92},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-23320","published":"2026-03-25","updated":"2026-04-03","checked_at":"2026-04-08T20:00:57.017Z","status_ok":true,"source_kind":"msrc_cve","confidence":0.99}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":"2026-03-25","cve_updated":"2026-04-03","published_at":"2026-03-25","updated_at":"2026-04-03","link_checked_at":"2026-04-08T20:00:57.017Z","sourceUrl":"https://www.cve.org/CVERecord?id=CVE-2026-23320","added":"2026-03-26T08:28:51.140Z","public_url":"https://www.cve.org/CVERecord?id=CVE-2026-23320","public_source":"CVE","public_source_slug":"cve","public_published":"2026-03-25","public_updated":"2026-04-03","public_display_date":"2026-04-03","public_sort_date":"2026-04-03","public_period_date":"2026-04-03","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2026-23320 cve-2026-23320 usb: gadget: f_ncm: align net_device lifecycle with bind/unbind microsoft cve msrc","source_url_repaired_from":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23320","source_date":"2026-03-10"},{"id":"CVE-2026-23333","cve":"CVE-2026-23333","title":"netfilter: nft_set_rbtree: validate open interval overlap","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-25","date":"2026-03-25","updated":"2026-04-03","date_basis":"msrc_cve","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://www.cve.org/CVERecord?id=CVE-2026-23333","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23333","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23333","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-08T20:01:00.032Z","status_ok":null,"source_kind":"vendor","confidence":0.92},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-23333","published":"2026-03-25","updated":"2026-04-03","checked_at":"2026-04-08T20:01:00.032Z","status_ok":true,"source_kind":"msrc_cve","confidence":0.99}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":"2026-03-25","cve_updated":"2026-04-03","published_at":"2026-03-25","updated_at":"2026-04-03","link_checked_at":"2026-04-08T20:01:00.032Z","sourceUrl":"https://www.cve.org/CVERecord?id=CVE-2026-23333","added":"2026-03-26T08:28:51.140Z","public_url":"https://www.cve.org/CVERecord?id=CVE-2026-23333","public_source":"CVE","public_source_slug":"cve","public_published":"2026-03-25","public_updated":"2026-04-03","public_display_date":"2026-04-03","public_sort_date":"2026-04-03","public_period_date":"2026-04-03","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2026-23333 cve-2026-23333 netfilter: nft_set_rbtree: validate open interval overlap microsoft cve msrc","source_url_repaired_from":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23333","source_date":"2026-03-10"},{"id":"CVE-2026-35386","cve":"CVE-2026-35386","title":"Mariner","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-02","date":"2026-04-02","updated":"2026-04-03","date_basis":"msrc_cve","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://www.cve.org/CVERecord?id=CVE-2026-35386","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35386","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35386","published":"2026-04-14","updated":"2026-04-14","checked_at":"2026-04-16T13:31:20.504Z","status_ok":null,"source_kind":"vendor","confidence":0.9},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-35386","published":"2026-04-02","updated":"2026-04-03","checked_at":"2026-04-16T13:31:20.504Z","status_ok":true,"source_kind":"msrc_cve","confidence":0.99}],"exploited":false,"severity":"low","cvss":3.6,"cve_published":"2026-04-02","cve_updated":"2026-04-03","link_checked_at":"2026-04-16T13:31:20.504Z","published_at":"2026-04-02","updated_at":"2026-04-03","sourceUrl":"https://www.cve.org/CVERecord?id=CVE-2026-35386","added":"2026-04-03T00:00:00.000Z","public_url":"https://www.cve.org/CVERecord?id=CVE-2026-35386","public_source":"CVE","public_source_slug":"cve","public_published":"2026-04-02","public_updated":"2026-04-03","public_display_date":"2026-04-03","public_sort_date":"2026-04-03","public_period_date":"2026-04-03","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2026-35386 cve-2026-35386 mariner microsoft cve msrc"},{"id":"BSI:WID-SEC-2024-0699","cve":"","title":"Linux-Kernel: Mehrere Schwachstellen ermöglichen Denial of Service und unspezifische Angriffe","date":"2026-04-02","published":"2026-04-02","updated":null,"source_published":"2026-04-02","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0699","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0699","published":"2026-04-02","updated":"2026-04-02","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-07T09:01:29.157Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0699","added":"2026-04-02T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0699","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-02","public_updated":null,"public_display_date":"2026-04-02","public_sort_date":"2026-04-02","public_period_date":"2026-04-02","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2024-0699 linux-kernel: mehrere schwachstellen ermöglichen denial of service und unspezifische angriffe bsi bsi"},{"id":"BSI:WID-SEC-2024-1259","cve":"","title":"Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service und unspezifischen Angriff","date":"2026-04-02","published":"2026-04-02","updated":null,"source_published":"2026-04-02","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1259","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1259","published":"2026-04-02","updated":"2026-04-02","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-07T09:01:29.157Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1259","added":"2026-04-02T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1259","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-02","public_updated":null,"public_display_date":"2026-04-02","public_sort_date":"2026-04-02","public_period_date":"2026-04-02","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2024-1259 linux kernel: mehrere schwachstellen ermöglichen denial of service und unspezifischen angriff bsi bsi"},{"id":"BSI:WID-SEC-2024-2173","cve":"","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-04-02","published":"2026-04-02","updated":null,"source_published":"2026-04-02","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-2173","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-2173","published":"2026-04-02","updated":"2026-04-02","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-07T09:01:29.157Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-2173","added":"2026-04-02T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-2173","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-02","public_updated":null,"public_display_date":"2026-04-02","public_sort_date":"2026-04-02","public_period_date":"2026-04-02","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2024-2173 linux kernel: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0345","cve":"","title":"Golang Go: Mehrere Schwachstellen","date":"2026-04-02","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0345","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-07T09:01:29.157Z","published":"2026-04-02","source_published":"2026-04-02","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0345","published":"2026-04-02","updated":"2026-04-02","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-03-25","source_doc_updated":"2026-03-25","cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0345","added":"2026-04-02T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0345","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-02","public_updated":null,"public_display_date":"2026-04-02","public_sort_date":"2026-04-02","public_period_date":"2026-04-02","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0345 golang go: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0419","cve":"","title":"vim (NetBeans): Schwachstelle ermöglicht Codeausführung","date":"2026-04-02","published":"2026-04-02","updated":null,"source_published":"2026-04-02","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0419","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0419","published":"2026-04-02","updated":"2026-04-02","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-02T09:00:47.348Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0419","added":"2026-04-02T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0419","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-02","public_updated":null,"public_display_date":"2026-04-02","public_sort_date":"2026-04-02","public_period_date":"2026-04-02","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0419 vim (netbeans): schwachstelle ermöglicht codeausführung bsi bsi"},{"id":"BSI:WID-SEC-2026-0443","cve":"","title":"Apache Tomcat und Tomcat Native: Mehrere Schwachstellen","date":"2026-04-02","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0443","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-02T09:00:47.348Z","published":"2026-04-02","source_published":"2026-04-02","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0443","published":"2026-04-02","updated":"2026-04-02","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0443","added":"2026-04-02T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0443","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-02","public_updated":null,"public_display_date":"2026-04-02","public_sort_date":"2026-04-02","public_period_date":"2026-04-02","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0443 apache tomcat und tomcat native: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0462","cve":"","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-04-02","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0462","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-02T09:00:47.348Z","published":"2026-04-02","source_published":"2026-04-02","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0462","published":"2026-04-02","updated":"2026-04-02","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0462","added":"2026-04-02T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0462","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-02","public_updated":null,"public_display_date":"2026-04-02","public_sort_date":"2026-04-02","public_period_date":"2026-04-02","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0462 linux kernel: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0479","cve":"","title":"Red Hat OpenShift Service Mesh (Kiali): Schwachstelle ermöglicht Denial of Service","date":"2026-04-02","published":"2026-04-02","updated":null,"source_published":"2026-04-02","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0479","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0479","published":"2026-04-02","updated":"2026-04-02","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-07T09:01:29.157Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0479","added":"2026-04-02T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0479","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-02","public_updated":null,"public_display_date":"2026-04-02","public_sort_date":"2026-04-02","public_period_date":"2026-04-02","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0479 red hat openshift service mesh (kiali): schwachstelle ermöglicht denial of service bsi bsi"},{"id":"BSI:WID-SEC-2026-0494","cve":"","title":"Red Hat Enterprise Linux (389-ds-base): Schwachstelle ermöglicht Codeausführung und potenziell Denial of Service","date":"2026-04-02","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0494","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-02T09:00:47.348Z","published":"2026-04-02","source_published":"2026-04-02","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0494","published":"2026-04-02","updated":"2026-04-02","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0494","added":"2026-04-02T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0494","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-02","public_updated":null,"public_display_date":"2026-04-02","public_sort_date":"2026-04-02","public_period_date":"2026-04-02","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0494 red hat enterprise linux (389-ds-base): schwachstelle ermöglicht codeausführung und potenziell denial of service bsi bsi"},{"id":"BSI:WID-SEC-2026-0499","cve":"","title":"ImageMagick: Mehrere Schwachstellen","date":"2026-04-02","published":"2026-04-02","updated":null,"source_published":"2026-04-02","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0499","severity":"low","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0499","published":"2026-04-02","updated":"2026-04-02","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-02T09:00:47.348Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0499","added":"2026-04-02T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0499","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-02","public_updated":null,"public_display_date":"2026-04-02","public_sort_date":"2026-04-02","public_period_date":"2026-04-02","severity_norm":"low","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0499 imagemagick: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0615","cve":"","title":"Red Hat Enterprise Linux (nfs-utils): Schwachstelle ermöglicht Offenlegung von Informationen","date":"2026-04-02","published":"2026-04-02","updated":null,"source_published":"2026-04-02","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0615","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-07T09:01:29.157Z","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0615","published":"2026-04-02","updated":"2026-04-02","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0615","added":"2026-04-02T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0615","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-02","public_updated":null,"public_display_date":"2026-04-02","public_sort_date":"2026-04-02","public_period_date":"2026-04-02","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0615 red hat enterprise linux (nfs-utils): schwachstelle ermöglicht offenlegung von informationen bsi bsi"},{"id":"BSI:WID-SEC-2026-0690","cve":"","title":"cURL: Mehrere Schwachstellen","date":"2026-04-02","published":"2026-04-02","updated":null,"source_published":"2026-04-02","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0690","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0690","published":"2026-04-02","updated":"2026-04-02","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-07T09:01:29.157Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0690","added":"2026-04-02T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0690","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-02","public_updated":null,"public_display_date":"2026-04-02","public_sort_date":"2026-04-02","public_period_date":"2026-04-02","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0690 curl: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0704","cve":"","title":"Google Cloud Platform Envoy Proxy, Istio und Service Mesh: Mehrere Schwachstellen","date":"2026-04-02","published":"2026-04-02","updated":null,"source_published":"2026-04-02","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0704","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0704","published":"2026-04-02","updated":"2026-04-02","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-07T09:01:29.157Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0704","added":"2026-04-02T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0704","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-02","public_updated":null,"public_display_date":"2026-04-02","public_sort_date":"2026-04-02","public_period_date":"2026-04-02","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0704 google cloud platform envoy proxy, istio und service mesh: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0760","cve":"","title":"Xen und Citrix Systems XenServer: Mehrere Schwachstellen","date":"2026-04-02","published":"2026-04-02","updated":null,"source_published":"2026-04-02","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0760","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0760","published":"2026-04-02","updated":"2026-04-02","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-07T09:01:29.157Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0760","added":"2026-04-02T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0760","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-02","public_updated":null,"public_display_date":"2026-04-02","public_sort_date":"2026-04-02","public_period_date":"2026-04-02","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0760 xen und citrix systems xenserver: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0774","cve":"","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-04-02","published":"2026-04-02","updated":null,"source_published":"2026-04-02","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0774","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0774","published":"2026-04-02","updated":"2026-04-02","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-07T09:01:29.157Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0774","added":"2026-04-02T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0774","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-02","public_updated":null,"public_display_date":"2026-04-02","public_sort_date":"2026-04-02","public_period_date":"2026-04-02","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0774 linux kernel: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0782","cve":"","title":"WebKitGTK: Mehrere Schwachstellen","date":"2026-04-02","published":"2026-04-02","updated":null,"source_published":"2026-04-02","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0782","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0782","published":"2026-04-02","updated":"2026-04-02","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-07T09:01:29.157Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0782","added":"2026-04-02T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0782","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-02","public_updated":null,"public_display_date":"2026-04-02","public_sort_date":"2026-04-02","public_period_date":"2026-04-02","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0782 webkitgtk: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0790","cve":"","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-04-02","published":"2026-04-02","updated":null,"source_published":"2026-04-02","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0790","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0790","published":"2026-04-02","updated":"2026-04-02","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-07T09:01:29.157Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0790","added":"2026-04-02T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0790","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-02","public_updated":null,"public_display_date":"2026-04-02","public_sort_date":"2026-04-02","public_period_date":"2026-04-02","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0790 linux kernel: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0809","cve":"","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-04-02","published":"2026-04-02","updated":null,"source_published":"2026-04-02","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0809","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0809","published":"2026-04-02","updated":"2026-04-02","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-07T09:01:29.157Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0809","added":"2026-04-02T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0809","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-02","public_updated":null,"public_display_date":"2026-04-02","public_sort_date":"2026-04-02","public_period_date":"2026-04-02","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0809 linux kernel: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0820","cve":"","title":"Checkmk: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen","date":"2026-04-02","published":"2026-04-02","updated":null,"source_published":"2026-04-02","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0820","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0820","published":"2026-04-02","updated":"2026-04-02","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-07T09:01:29.157Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0820","added":"2026-04-02T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0820","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-02","public_updated":null,"public_display_date":"2026-04-02","public_sort_date":"2026-04-02","public_period_date":"2026-04-02","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0820 checkmk: schwachstelle ermöglicht umgehen von sicherheitsvorkehrungen bsi bsi"},{"id":"BSI:WID-SEC-2026-0846","cve":"","title":"Netty: Mehrere Schwachstellen","date":"2026-04-02","published":"2026-04-02","updated":null,"source_published":"2026-04-02","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0846","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0846","published":"2026-04-02","updated":"2026-04-02","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-07T09:01:29.157Z","source_doc_published":"2026-03-25","source_doc_updated":"2026-03-25","cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0846","added":"2026-04-02T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0846","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-02","public_updated":null,"public_display_date":"2026-04-02","public_sort_date":"2026-04-02","public_period_date":"2026-04-02","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0846 netty: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0904","cve":"","title":"vim: Schwachstelle ermöglicht Codeausführung","date":"2026-04-02","published":"2026-04-02","updated":null,"source_published":"2026-04-02","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0904","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0904","published":"2026-04-02","updated":"2026-04-02","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-07T09:01:29.157Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0904","added":"2026-04-02T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0904","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-02","public_updated":null,"public_display_date":"2026-04-02","public_sort_date":"2026-04-02","public_period_date":"2026-04-02","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0904 vim: schwachstelle ermöglicht codeausführung bsi bsi"},{"id":"BSI:WID-SEC-2026-0906","cve":"","title":"IBM DataPower Gateway: Schwachstelle ermöglicht Offenlegung von Informationen","date":"2026-04-02","published":"2026-04-02","updated":null,"source_published":"2026-04-02","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0906","severity":"low","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0906","published":"2026-04-02","updated":"2026-04-02","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-07T09:01:29.157Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0906","added":"2026-04-02T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0906","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-02","public_updated":null,"public_display_date":"2026-04-02","public_sort_date":"2026-04-02","public_period_date":"2026-04-02","severity_norm":"low","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0906 ibm datapower gateway: schwachstelle ermöglicht offenlegung von informationen bsi bsi"},{"id":"BSI:WID-SEC-2026-0922","cve":"","title":"Docker Desktop Model Runner: Schwachstelle ermöglicht Offenlegung von Informationen","date":"2026-04-02","published":"2026-04-02","updated":null,"source_published":"2026-04-02","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0922","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0922","published":"2026-04-02","updated":"2026-04-02","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-07T09:01:29.157Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0922","added":"2026-04-02T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0922","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-02","public_updated":null,"public_display_date":"2026-04-02","public_sort_date":"2026-04-02","public_period_date":"2026-04-02","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0922 docker desktop model runner: schwachstelle ermöglicht offenlegung von informationen bsi bsi"},{"id":"BSI:WID-SEC-2026-0924","cve":"","title":"IBM DataPower Gateway: Mehrere Schwachstellen","date":"2026-04-02","published":"2026-04-02","updated":null,"source_published":"2026-04-02","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0924","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0924","published":"2026-04-02","updated":"2026-04-02","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-07T09:01:29.157Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0924","added":"2026-04-02T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0924","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-02","public_updated":null,"public_display_date":"2026-04-02","public_sort_date":"2026-04-02","public_period_date":"2026-04-02","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0924 ibm datapower gateway: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0954","cve":"","title":"Drupal (SAML SSO): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen","date":"2026-04-02","published":"2026-04-02","updated":null,"source_published":"2026-04-02","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0954","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0954","published":"2026-04-02","updated":"2026-04-02","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-07T09:01:29.157Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0954","added":"2026-04-02T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0954","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-02","public_updated":null,"public_display_date":"2026-04-02","public_sort_date":"2026-04-02","public_period_date":"2026-04-02","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0954 drupal (saml sso): schwachstelle ermöglicht umgehen von sicherheitsvorkehrungen bsi bsi"},{"id":"BSI:WID-SEC-2026-0955","cve":"","title":"Cisco Nexus Dashboard und Insights: Mehrere Schwachstellen","date":"2026-04-02","published":"2026-04-02","updated":null,"source_published":"2026-04-02","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0955","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0955","published":"2026-04-02","updated":"2026-04-02","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-07T09:01:29.157Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0955","added":"2026-04-02T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0955","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-02","public_updated":null,"public_display_date":"2026-04-02","public_sort_date":"2026-04-02","public_period_date":"2026-04-02","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0955 cisco nexus dashboard und insights: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0956","cve":"","title":"M-Files M-Files Server: Schwachstelle ermöglicht Offenlegung von Informationen","date":"2026-04-02","published":"2026-04-02","updated":null,"source_published":"2026-04-02","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0956","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0956","published":"2026-04-02","updated":"2026-04-02","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-07T09:01:29.157Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0956","added":"2026-04-02T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0956","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-02","public_updated":null,"public_display_date":"2026-04-02","public_sort_date":"2026-04-02","public_period_date":"2026-04-02","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0956 m-files m-files server: schwachstelle ermöglicht offenlegung von informationen bsi bsi"},{"id":"BSI:WID-SEC-2026-0957","cve":"","title":"IGEL UMS: Schwachstelle ermöglicht Offenlegung von Informationen","date":"2026-04-02","published":"2026-04-02","updated":null,"source_published":"2026-04-02","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0957","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0957","published":"2026-04-02","updated":"2026-04-02","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-07T09:01:29.157Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0957","added":"2026-04-02T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0957","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-02","public_updated":null,"public_display_date":"2026-04-02","public_sort_date":"2026-04-02","public_period_date":"2026-04-02","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0957 igel ums: schwachstelle ermöglicht offenlegung von informationen bsi bsi"},{"id":"BSI:WID-SEC-2026-0958","cve":"","title":"Devolutions Server: Mehrere Schwachstellen","date":"2026-04-02","published":"2026-04-02","updated":null,"source_published":"2026-04-02","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0958","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0958","published":"2026-04-02","updated":"2026-04-02","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-07T09:01:29.157Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0958","added":"2026-04-02T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0958","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-02","public_updated":null,"public_display_date":"2026-04-02","public_sort_date":"2026-04-02","public_period_date":"2026-04-02","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0958 devolutions server: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0959","cve":"","title":"VertiGIS FM: Mehrere Schwachstellen","date":"2026-04-02","published":"2026-04-02","updated":null,"source_published":"2026-04-02","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0959","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0959","published":"2026-04-02","updated":"2026-04-02","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-07T09:01:29.157Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0959","added":"2026-04-02T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0959","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-02","public_updated":null,"public_display_date":"2026-04-02","public_sort_date":"2026-04-02","public_period_date":"2026-04-02","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0959 vertigis fm: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0960","cve":"","title":"HCL BigFix Platform: Mehrere Schwachstellen","date":"2026-04-02","published":"2026-04-02","updated":null,"source_published":"2026-04-02","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0960","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0960","published":"2026-04-02","updated":"2026-04-02","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-07T09:01:29.157Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0960","added":"2026-04-02T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0960","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-02","public_updated":null,"public_display_date":"2026-04-02","public_sort_date":"2026-04-02","public_period_date":"2026-04-02","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0960 hcl bigfix platform: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0961","cve":"","title":"Netgate pfSense Plus und CE: Mehrere Schwachstellen","date":"2026-04-02","published":"2026-04-02","updated":null,"source_published":"2026-04-02","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0961","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0961","published":"2026-04-02","updated":"2026-04-02","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-07T09:01:29.157Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0961","added":"2026-04-02T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0961","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-02","public_updated":null,"public_display_date":"2026-04-02","public_sort_date":"2026-04-02","public_period_date":"2026-04-02","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0961 netgate pfsense plus und ce: mehrere schwachstellen bsi bsi"},{"id":"CVE-2026-26135","cve":"CVE-2026-26135","title":"Azure Custom Locations Resource Provider (RP) Elevation of Privilege Vulnerability","source_published":"2026-04-02","source_updated":null,"source_doc_published":"2026-04-02","source_doc_updated":"2026-04-02","published":"2026-04-02","date":"2026-04-02","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26135","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26135","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26135","published":"2026-04-02","updated":"2026-04-02","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.6,"cve_published":null,"cve_updated":null,"published_at":"2026-04-02","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26135","added":"2026-04-02T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26135","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"critical","search_text":"cve-2026-26135 cve-2026-26135 azure custom locations resource provider (rp) elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-02","public_updated":null,"public_display_date":"2026-04-02","public_sort_date":"2026-04-02","public_period_date":"2026-04-02"},{"id":"CVE-2026-32173","cve":"CVE-2026-32173","title":"Azure SRE Agent Information Disclosure Vulnerability","source_published":"2026-04-02","source_updated":null,"source_doc_published":"2026-04-02","source_doc_updated":"2026-04-02","published":"2026-04-02","date":"2026-04-02","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32173","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32173","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32173","published":"2026-04-02","updated":"2026-04-02","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.6,"cve_published":null,"cve_updated":null,"published_at":"2026-04-02","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32173","added":"2026-04-02T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32173","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"high","search_text":"cve-2026-32173 cve-2026-32173 azure sre agent information disclosure vulnerability microsoft msrc msrc","public_published":"2026-04-02","public_updated":null,"public_display_date":"2026-04-02","public_sort_date":"2026-04-02","public_period_date":"2026-04-02"},{"id":"CVE-2026-32186","cve":"CVE-2026-32186","title":"Microsoft Bing Elevation of Privilege Vulnerability","source_published":"2026-04-02","source_updated":null,"source_doc_published":"2026-04-02","source_doc_updated":"2026-04-02","published":"2026-04-02","date":"2026-04-02","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32186","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32186","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32186","published":"2026-04-02","updated":"2026-04-02","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":10,"cve_published":null,"cve_updated":null,"published_at":"2026-04-02","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32186","added":"2026-04-02T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32186","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"critical","search_text":"cve-2026-32186 cve-2026-32186 microsoft bing elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-02","public_updated":null,"public_display_date":"2026-04-02","public_sort_date":"2026-04-02","public_period_date":"2026-04-02"},{"id":"CVE-2026-32211","cve":"CVE-2026-32211","title":"Azure MCP Server Information Disclosure Vulnerability","source_published":"2026-04-02","source_updated":null,"source_doc_published":"2026-04-02","source_doc_updated":"2026-04-02","published":"2026-04-02","date":"2026-04-02","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32211","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32211","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32211","published":"2026-04-02","updated":"2026-04-02","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.1,"cve_published":null,"cve_updated":null,"published_at":"2026-04-02","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32211","added":"2026-04-02T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32211","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"critical","search_text":"cve-2026-32211 cve-2026-32211 azure mcp server information disclosure vulnerability microsoft msrc msrc","public_published":"2026-04-02","public_updated":null,"public_display_date":"2026-04-02","public_sort_date":"2026-04-02","public_period_date":"2026-04-02"},{"id":"CVE-2026-32213","cve":"CVE-2026-32213","title":"Azure AI Foundry Elevation of Privilege Vulnerability","source_published":"2026-04-02","source_updated":null,"source_doc_published":"2026-04-02","source_doc_updated":"2026-04-02","published":"2026-04-02","date":"2026-04-02","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32213","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32213","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32213","published":"2026-04-02","updated":"2026-04-02","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":10,"cve_published":"2026-04-02","cve_updated":"2026-04-04","published_at":"2026-04-02","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32213","added":"2026-04-02T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32213","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"critical","search_text":"cve-2026-32213 cve-2026-32213 azure ai foundry elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-02","public_updated":null,"public_display_date":"2026-04-02","public_sort_date":"2026-04-02","public_period_date":"2026-04-02"},{"id":"CVE-2026-33105","cve":"CVE-2026-33105","title":"Microsoft Azure Kubernetes Service Elevation of Privilege Vulnerability","source_published":"2026-04-02","source_updated":null,"source_doc_published":"2026-04-02","source_doc_updated":"2026-04-02","published":"2026-04-02","date":"2026-04-02","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33105","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33105","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33105","published":"2026-04-02","updated":"2026-04-02","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":10,"cve_published":null,"cve_updated":null,"published_at":"2026-04-02","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33105","added":"2026-04-02T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33105","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"critical","search_text":"cve-2026-33105 cve-2026-33105 microsoft azure kubernetes service elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-02","public_updated":null,"public_display_date":"2026-04-02","public_sort_date":"2026-04-02","public_period_date":"2026-04-02"},{"id":"CVE-2026-33107","cve":"CVE-2026-33107","title":"Azure Databricks Elevation of Privilege Vulnerability","source_published":"2026-04-02","source_updated":null,"source_doc_published":"2026-04-02","source_doc_updated":"2026-04-02","published":"2026-04-02","date":"2026-04-02","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33107","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33107","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33107","published":"2026-04-02","updated":"2026-04-02","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":10,"cve_published":null,"cve_updated":null,"published_at":"2026-04-02","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33107","added":"2026-04-02T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33107","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"critical","search_text":"cve-2026-33107 cve-2026-33107 azure databricks elevation of privilege vulnerability microsoft msrc msrc","public_published":"2026-04-02","public_updated":null,"public_display_date":"2026-04-02","public_sort_date":"2026-04-02","public_period_date":"2026-04-02"},{"id":"CVE-2026-33118","cve":"CVE-2026-33118","title":"Microsoft Edge (Chromium-based) Spoofing Vulnerability","source_published":"2026-04-02","source_updated":null,"source_doc_published":"2026-04-02","source_doc_updated":"2026-04-02","published":"2026-04-02","date":"2026-04-02","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33118","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33118","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33118","published":"2026-04-02","updated":"2026-04-02","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.3,"cve_published":null,"cve_updated":null,"published_at":"2026-04-02","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33118","added":"2026-04-02T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33118","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-33118 cve-2026-33118 microsoft edge (chromium-based) spoofing vulnerability microsoft msrc msrc","public_published":"2026-04-02","public_updated":null,"public_display_date":"2026-04-02","public_sort_date":"2026-04-02","public_period_date":"2026-04-02"},{"id":"CVE-2026-33119","cve":"CVE-2026-33119","title":"Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability","source_published":"2026-04-02","source_updated":null,"source_doc_published":"2026-04-02","source_doc_updated":"2026-04-02","published":"2026-04-02","date":"2026-04-02","updated":null,"date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33119","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33119","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33119","published":"2026-04-02","updated":"2026-04-02","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.4,"cve_published":null,"cve_updated":null,"published_at":"2026-04-02","updated_at":null,"link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33119","added":"2026-04-02T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33119","public_source":"MSRC","public_source_slug":"msrc","vendor_slug":"microsoft","severity_norm":"medium","search_text":"cve-2026-33119 cve-2026-33119 microsoft edge (chromium-based) for android spoofing vulnerability microsoft msrc msrc","public_published":"2026-04-02","public_updated":null,"public_display_date":"2026-04-02","public_sort_date":"2026-04-02","public_period_date":"2026-04-02"},{"id":"CVE-2026-35414","cve":"CVE-2026-35414","title":"Mariner","source_published":"2026-04-14","source_updated":null,"source_doc_published":"2026-04-14","source_doc_updated":"2026-04-14","published":"2026-04-02","date":"2026-04-02","updated":null,"date_basis":"msrc_cve","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://www.cve.org/CVERecord?id=CVE-2026-35414","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35414","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35414","published":"2026-04-14","updated":"2026-04-14","checked_at":"2026-04-16T13:31:20.420Z","status_ok":null,"source_kind":"vendor","confidence":0.9},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-35414","published":"2026-04-02","updated":"2026-04-02","checked_at":"2026-04-16T13:31:20.420Z","status_ok":true,"source_kind":"msrc_cve","confidence":0.99}],"exploited":false,"severity":"medium","cvss":4.2,"cve_published":"2026-04-02","cve_updated":"2026-04-02","link_checked_at":"2026-04-16T13:31:20.420Z","published_at":"2026-04-02","updated_at":null,"sourceUrl":"https://www.cve.org/CVERecord?id=CVE-2026-35414","added":"2026-04-02T00:00:00.000Z","public_url":"https://www.cve.org/CVERecord?id=CVE-2026-35414","public_source":"CVE","public_source_slug":"cve","public_published":"2026-04-02","public_updated":null,"public_display_date":"2026-04-02","public_sort_date":"2026-04-02","public_period_date":"2026-04-02","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2026-35414 cve-2026-35414 mariner microsoft cve msrc"},{"id":"CVE:CVE-2026-3502","cve":"CVE-2026-3502","title":"TrueConf Client Download of Code Without Integrity Check Vulnerability","date":"2026-04-02","vendor":"TrueConf","product":"Client","source":"CISA-KEV","cisa_url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog","source_url":"https://nvd.nist.gov/vuln/detail/CVE-2026-3502","severity":"high","ransomware":"Unknown","cvss":null,"exploited":true,"published":"2026-04-02","updated":null,"source_published":"2026-04-02","source_updated":null,"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"candidates":[{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-3502","published":"2026-04-02","updated":"2026-04-02","checked_at":null,"status_ok":null,"source_kind":"nvd","confidence":0.8}],"date_basis":"nvd","link_checked_at":null,"sourceUrl":"https://nvd.nist.gov/vuln/detail/CVE-2026-3502","added":"2026-04-02T00:00:00.000Z","public_url":"https://nvd.nist.gov/vuln/detail/CVE-2026-3502","public_source":"CVE","public_source_slug":"cve","public_published":"2026-04-02","public_updated":null,"public_display_date":"2026-04-02","public_sort_date":"2026-04-02","public_period_date":"2026-04-02","severity_norm":"high","vendor_slug":"trueconf","search_text":"cve:cve-2026-3502 cve-2026-3502 trueconf client download of code without integrity check vulnerability trueconf client cve cisa-kev unknown"},{"id":"BSI:WID-SEC-2025-1265","cve":"","title":"Red Hat Enterprise Linux (libxslt): Schwachstelle ermöglicht Offenlegung von Informationen","date":"2026-04-01","published":"2026-04-01","updated":null,"source_published":"2026-04-01","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1265","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1265","published":"2026-04-01","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-01T12:01:12.470Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1265","added":"2026-04-01T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1265","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-01","public_updated":null,"public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2025-1265 red hat enterprise linux (libxslt): schwachstelle ermöglicht offenlegung von informationen bsi bsi"},{"id":"BSI:WID-SEC-2025-2012","cve":"","title":"cPanel cPanel/WHM: Schwachstelle ermöglicht Manipulation von Dateien","date":"2026-04-01","published":"2026-04-01","updated":null,"source_published":"2026-04-01","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2012","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2012","published":"2026-04-01","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-01T09:00:59.094Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2012","added":"2026-04-01T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2012","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-01","public_updated":null,"public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2012 cpanel cpanel/whm: schwachstelle ermöglicht manipulation von dateien bsi bsi"},{"id":"BSI:WID-SEC-2025-2045","cve":"","title":"expat: Schwachstelle ermöglicht Denial of Service","date":"2026-04-01","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2045","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-01T09:00:59.094Z","published":"2026-04-01","source_published":"2026-04-01","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2045","published":"2026-04-01","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2045","added":"2026-04-01T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2045","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-01","public_updated":null,"public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2045 expat: schwachstelle ermöglicht denial of service bsi bsi"},{"id":"BSI:WID-SEC-2025-2053","cve":"","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-04-01","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2053","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-01T12:01:12.470Z","published":"2026-04-01","source_published":"2026-04-01","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2053","published":"2026-04-01","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2053","added":"2026-04-01T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2053","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-01","public_updated":null,"public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2053 linux kernel: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2025-2081","cve":"","title":"cPanel cPanel/WHM: Schwachstelle ermöglicht Denial of Service","date":"2026-04-01","published":"2026-04-01","updated":null,"source_published":"2026-04-01","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2081","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2081","published":"2026-04-01","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-01T12:01:12.470Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2081","added":"2026-04-01T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2081","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-01","public_updated":null,"public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2081 cpanel cpanel/whm: schwachstelle ermöglicht denial of service bsi bsi"},{"id":"BSI:WID-SEC-2025-2166","cve":"","title":"OpenSSL und LibreSSL: Mehrere Schwachstellen","date":"2026-04-01","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2166","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-01T12:01:12.470Z","published":"2026-04-01","source_published":"2026-04-01","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2166","published":"2026-04-01","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2166","added":"2026-04-01T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2166","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-01","public_updated":null,"public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2166 openssl und libressl: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2025-2215","cve":"","title":"Ruby: Schwachstelle ermöglicht Offenlegung von Informationen","date":"2026-04-01","published":"2026-04-01","updated":null,"source_published":"2026-04-01","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2215","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2215","published":"2026-04-01","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-01T12:01:12.470Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2215","added":"2026-04-01T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2215","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-01","public_updated":null,"public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2215 ruby: schwachstelle ermöglicht offenlegung von informationen bsi bsi"},{"id":"BSI:WID-SEC-2025-2310","cve":"","title":"F5 BIG-IP und F5OS: Mehrere Schwachstellen","date":"2026-04-01","published":"2026-04-01","updated":null,"source_published":"2026-04-01","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2310","severity":"critical","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2310","published":"2026-04-01","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-01T09:00:59.094Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2310","added":"2026-04-01T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2310","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-01","public_updated":null,"public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2310 f5 big-ip und f5os: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2025-2710","cve":"","title":"cPanel cPanel/WHM: Schwachstelle ermöglicht Privilegieneskalation","date":"2026-04-01","published":"2026-04-01","updated":null,"source_published":"2026-04-01","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2710","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2710","published":"2026-04-01","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-01T12:01:12.470Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2710","added":"2026-04-01T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2710","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-01","public_updated":null,"public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2710 cpanel cpanel/whm: schwachstelle ermöglicht privilegieneskalation bsi bsi"},{"id":"BSI:WID-SEC-2026-0691","cve":"","title":"OpenClaw: Mehrere Schwachstellen","date":"2026-04-01","published":"2026-04-01","updated":null,"source_published":"2026-04-01","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0691","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0691","published":"2026-04-01","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-01T12:01:12.470Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0691","added":"2026-04-01T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0691","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-01","public_updated":null,"public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0691 openclaw: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0711","cve":"","title":"OpenClaw: Mehrere Schwachstellen","date":"2026-04-01","published":"2026-04-01","updated":null,"source_published":"2026-04-01","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0711","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0711","published":"2026-04-01","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-01T12:01:12.470Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0711","added":"2026-04-01T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0711","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-01","public_updated":null,"public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0711 openclaw: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0727","cve":"","title":"OpenClaw: Mehrere Schwachstellen","date":"2026-04-01","published":"2026-04-01","updated":null,"source_published":"2026-04-01","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0727","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0727","published":"2026-04-01","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-01T12:01:12.470Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0727","added":"2026-04-01T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0727","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-01","public_updated":null,"public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0727 openclaw: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0735","cve":"","title":"Dell Secure Connect Gateway: Schwachstelle ermöglicht Codeausführung","date":"2026-04-01","published":"2026-04-01","updated":null,"source_published":"2026-04-01","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0735","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0735","published":"2026-04-01","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-01T12:01:12.470Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0735","added":"2026-04-01T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0735","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-01","public_updated":null,"public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0735 dell secure connect gateway: schwachstelle ermöglicht codeausführung bsi bsi"},{"id":"BSI:WID-SEC-2026-0743","cve":"","title":"OpenClaw: Mehrere Schwachstellen","date":"2026-04-01","published":"2026-04-01","updated":null,"source_published":"2026-04-01","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0743","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0743","published":"2026-04-01","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-01T12:01:12.470Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0743","added":"2026-04-01T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0743","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-01","public_updated":null,"public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0743 openclaw: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0878","cve":"","title":"FreeBSD Project FreeBSD OS: Mehrere Schwachstellen","date":"2026-04-01","published":"2026-04-01","updated":null,"source_published":"2026-04-01","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0878","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0878","published":"2026-04-01","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-01T12:01:12.470Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0878","added":"2026-04-01T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0878","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-01","public_updated":null,"public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0878 freebsd project freebsd os: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0930","cve":"","title":"OpenClaw: Mehrere Schwachstellen","date":"2026-04-01","published":"2026-04-01","updated":null,"source_published":"2026-04-01","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0930","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0930","published":"2026-04-01","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-01T12:01:12.470Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0930","added":"2026-04-01T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0930","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-01","public_updated":null,"public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0930 openclaw: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0936","cve":"","title":"Joomla CMS: Mehrere Schwachstellen","date":"2026-04-01","published":"2026-04-01","updated":null,"source_published":"2026-04-01","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0936","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0936","published":"2026-04-01","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-01T12:01:12.470Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0936","added":"2026-04-01T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0936","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-01","public_updated":null,"public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0936 joomla cms: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0938","cve":"","title":"ZScaler Client Connector: Schwachstelle ermöglicht Manipulation von Daten","date":"2026-04-01","published":"2026-04-01","updated":null,"source_published":"2026-04-01","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0938","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0938","published":"2026-04-01","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-01T12:01:12.470Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0938","added":"2026-04-01T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0938","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-01","public_updated":null,"public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0938 zscaler client connector: schwachstelle ermöglicht manipulation von daten bsi bsi"},{"id":"BSI:WID-SEC-2026-0940","cve":"","title":"vim: Schwachstelle ermöglicht Codeausführung","date":"2026-04-01","published":"2026-04-01","updated":null,"source_published":"2026-04-01","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0940","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0940","published":"2026-04-01","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-01T12:01:12.470Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0940","added":"2026-04-01T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0940","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-01","public_updated":null,"public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0940 vim: schwachstelle ermöglicht codeausführung bsi bsi"},{"id":"BSI:WID-SEC-2026-0941","cve":"","title":"Pega Platform: Schwachstelle ermöglicht Cross-Site Scripting","date":"2026-04-01","published":"2026-04-01","updated":null,"source_published":"2026-04-01","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0941","severity":"low","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0941","published":"2026-04-01","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-01T12:01:12.470Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0941","added":"2026-04-01T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0941","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-01","public_updated":null,"public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"low","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0941 pega platform: schwachstelle ermöglicht cross-site scripting bsi bsi"},{"id":"BSI:WID-SEC-2026-0942","cve":"","title":"xz: Schwachstelle ermöglicht Codeausführung","date":"2026-04-01","published":"2026-04-01","updated":null,"source_published":"2026-04-01","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0942","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0942","published":"2026-04-01","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-01T12:01:12.470Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0942","added":"2026-04-01T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0942","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-01","public_updated":null,"public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0942 xz: schwachstelle ermöglicht codeausführung bsi bsi"},{"id":"BSI:WID-SEC-2026-0943","cve":"","title":"IBM DataPower Gateway: Schwachstelle ermöglicht Denial of Service","date":"2026-04-01","published":"2026-04-01","updated":null,"source_published":"2026-04-01","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0943","severity":"low","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0943","published":"2026-04-01","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-01T12:01:12.470Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0943","added":"2026-04-01T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0943","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-01","public_updated":null,"public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"low","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0943 ibm datapower gateway: schwachstelle ermöglicht denial of service bsi bsi"},{"id":"BSI:WID-SEC-2026-0944","cve":"","title":"SonicWall Email Security Appliance: Mehrere Schwachstellen","date":"2026-04-01","published":"2026-04-01","updated":null,"source_published":"2026-04-01","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0944","severity":"low","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0944","published":"2026-04-01","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-01T12:01:12.470Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0944","added":"2026-04-01T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0944","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-01","public_updated":null,"public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"low","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0944 sonicwall email security appliance: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0947","cve":"","title":"CUPS: Mehrere Schwachstellen","date":"2026-04-01","published":"2026-04-01","updated":null,"source_published":"2026-04-01","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0947","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0947","published":"2026-04-01","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-01T12:01:12.470Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0947","added":"2026-04-01T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0947","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-01","public_updated":null,"public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0947 cups: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0948","cve":"","title":"OpenClaw: Mehrere Schwachstellen","date":"2026-04-01","published":"2026-04-01","updated":null,"source_published":"2026-04-01","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0948","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0948","published":"2026-04-01","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-01T12:01:12.470Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0948","added":"2026-04-01T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0948","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-04-01","public_updated":null,"public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0948 openclaw: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-W-2025-2637","cve":"CVE-2025-10158","title":"Rsync: Schwachstelle ermöglicht nicht spezifizierten Angriff","date":"2025-11-18","published":"2025-11-18","updated":"2026-04-01","source_published":"2025-11-18","source_updated":"2026-04-01","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://github.com/advisories/GHSA-3rvc-qcwh-fhqv","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2637.json","summary":"WID-SEC-W-2025-2637 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2637","summary":"WID-SEC-2025-2637 - Portal Version","category":"self"},{"url":"https://github.com/advisories/GHSA-3rvc-qcwh-fhqv","summary":"GitHub Advisory Database vom 2025-11-18","category":"external"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2415637","summary":"Red Hat Bugtracker vom 2025-11-18","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WTR6LAL7QWGPADIUYM5LIOP6CMA547CG/","summary":"openSUSE Security Update OPENSUSE-SU-2025:15827-1 vom 2025-12-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-December/023645.html","summary":"SUSE Security Update SUSE-SU-2025:4511-1 vom 2025-12-23","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WRDRGEIXSGC6SXSDLKJEFBU257AGJEUP/","summary":"SUSE Security Update SUSE-SU-2025:4511-1 vom 2025-12-23","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-January/023665.html","summary":"SUSE Security Update SUSE-SU-2026:0005-1 vom 2026-01-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-January/023689.html","summary":"SUSE Security Update SUSE-SU-2026:0041-1 vom 2026-01-06","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-January/023709.html","summary":"SUSE Security Update SUSE-SU-2026:0069-1 vom 2026-01-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-January/023763.html","summary":"SUSE Security Update SUSE-SU-2026:20044-1 vom 2026-01-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-January/023752.html","summary":"SUSE Security Update SUSE-SU-2026:20058-1 vom 2026-01-15","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2-2026-3157.html","summary":"Amazon Linux Security Advisory ALAS2-2026-3157 vom 2026-02-06","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-2026-1771771381","summary":"Fedora Security Advisory FEDORA-2026-1771771381 vom 2026-02-14","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-2026-77de001ef5","summary":"Fedora Security Advisory FEDORA-2026-77DE001EF5 vom 2026-02-14","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-2026-de8c9d7b6f","summary":"Fedora Security Advisory FEDORA-2026-DE8C9D7B6F vom 2026-02-17","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6390","summary":"Red Hat Security Advisory RHSA-2026:6390 vom 2026-04-01","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-6390.html","summary":"Oracle Linux Security Advisory ELSA-2026-6390 vom 2026-04-02","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6436","summary":"Red Hat Security Advisory RHSA-2026:6436 vom 2026-04-02","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected","last_affected"],"candidates":[{"url":"https://github.com/advisories/GHSA-3rvc-qcwh-fhqv","published":"2025-11-18","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"fastlane_seen_at":"2026-04-06T21:01:17.706Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://github.com/advisories/GHSA-3rvc-qcwh-fhqv","added":"2026-04-01T00:00:00.000Z","public_url":"https://github.com/advisories/GHSA-3rvc-qcwh-fhqv","public_source":"BSI","public_source_slug":"bsi","public_published":"2025-11-18","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-w-2025-2637 cve-2025-10158 rsync: schwachstelle ermöglicht nicht spezifizierten angriff bsi bsi"},{"id":"BSI:WID-SEC-W-2025-2724","cve":"CVE-2025-61727","title":"Golang Go: Mehrere Schwachstellen","date":"2025-12-02","published":"2025-12-02","updated":"2026-04-01","source_published":"2025-12-02","source_updated":"2026-04-01","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://groups.google.com/g/golang-announce/c/8FJoBkPddm4","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2724.json","summary":"WID-SEC-W-2025-2724 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2724","summary":"WID-SEC-2025-2724 - Portal Version","category":"self"},{"url":"https://groups.google.com/g/golang-announce/c/8FJoBkPddm4","summary":"Golang Announce vom 2025-12-02","category":"external"},{"url":"https://github.com/golang/go/issues/76445","summary":"Golang/Go GitHub vom 2025-12-02","category":"external"},{"url":"https://github.com/golang/go/issues/76442","summary":"Golang/Go GitHub vom 2025-12-02","category":"external"},{"url":"https://msrc.microsoft.com/update-guide/","summary":"Microsoft Leitfaden für Sicherheitsupdates vom 2025-12-09","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V6FRZFUY7IMUIH434HM7TP3Z4LTXGEXM/","summary":"SUSE Security Update SUSE-SU-2025:4337-1 vom 2025-12-10","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MQKJBVGIUPQFJGOASKZKHJ56ON2DGRDD/","summary":"SUSE Security Update SUSE-SU-2025:4336-1 vom 2025-12-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-December/023492.html","summary":"SUSE Security Update SUSE-SU-2025:4337-1 vom 2025-12-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-December/023493.html","summary":"SUSE Security Update SUSE-SU-2025:4336-1 vom 2025-12-10","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2U4ZHXRG6FRV2PVCQEFXC42LYXWQIXQG/","summary":"openSUSE Security Update OPENSUSE-SU-2025-20157-1 vom 2025-12-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-December/023549.html","summary":"SUSE Security Update SUSE-SU-2025:21192-1 vom 2025-12-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-December/023548.html","summary":"SUSE Security Update SUSE-SU-2025:21193-1 vom 2025-12-15","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2ECS-2025-090.html","summary":"Amazon Linux Security Advisory ALAS2ECS-2025-090 vom 2026-01-05","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2ECS-2025-091.html","summary":"Amazon Linux Security Advisory ALAS2ECS-2025-091 vom 2026-01-05","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2-2025-3119.html","summary":"Amazon Linux Security Advisory ALAS2-2025-3119 vom 2026-01-05","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2-2025-3118.html","summary":"Amazon Linux Security Advisory ALAS2-2025-3118 vom 2026-01-05","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2-2025-3120.html","summary":"Amazon Linux Security Advisory ALAS2-2025-3120 vom 2026-01-05","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2NITRO-ENCLAVES-2025-083.html","summary":"Amazon Linux Security Advisory ALAS2NITRO-ENCLAVES-2025-083 vom 2026-01-05","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2NITRO-ENCLAVES-2025-084.html","summary":"Amazon Linux Security Advisory ALAS2NITRO-ENCLAVES-2025-084 vom 2026-01-05","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2-2025-3098.html","summary":"Amazon Linux Security Advisory ALAS2-2025-3098 vom 2026-01-05","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2-2025-3100.html","summary":"Amazon Linux Security Advisory ALAS2-2025-3100 vom 2026-01-05","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2-2025-3097.html","summary":"Amazon Linux Security Advisory ALAS2-2025-3097 vom 2026-01-05","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2NITRO-ENCLAVES-2025-082.html","summary":"Amazon Linux Security Advisory ALAS2NITRO-ENCLAVES-2025-082 vom 2026-01-05","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2NITRO-ENCLAVES-2025-081.html","summary":"Amazon Linux Security Advisory ALAS2NITRO-ENCLAVES-2025-081 vom 2026-01-05","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2-2025-3105.html","summary":"Amazon Linux Security Advisory ALAS2-2025-3105 vom 2026-01-05","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2NITRO-ENCLAVES-2025-080.html","summary":"Amazon Linux Security Advisory ALAS2NITRO-ENCLAVES-2025-080 vom 2026-01-05","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2NITRO-ENCLAVES-2025-079.html","summary":"Amazon Linux Security Advisory ALAS2NITRO-ENCLAVES-2025-079 vom 2026-01-05","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2DOCKER-2025-087.html","summary":"Amazon Linux Security Advisory ALAS2DOCKER-2025-087 vom 2026-01-05","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2DOCKER-2025-088.html","summary":"Amazon Linux Security Advisory ALAS2DOCKER-2025-088 vom 2026-01-05","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2DOCKER-2025-089.html","summary":"Amazon Linux Security Advisory ALAS2DOCKER-2025-089 vom 2026-01-05","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2DOCKER-2025-090.html","summary":"Amazon Linux Security Advisory ALAS2DOCKER-2025-090 vom 2026-01-05","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2DOCKER-2025-091.html","summary":"Amazon Linux Security Advisory ALAS2DOCKER-2025-091 vom 2026-01-05","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2DOCKER-2025-092.html","summary":"Amazon Linux Security Advisory ALAS2DOCKER-2025-092 vom 2026-01-05","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2DOCKER-2025-093.html","summary":"Amazon Linux Security Advisory ALAS2DOCKER-2025-093 vom 2026-01-05","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2DOCKER-2025-094.html","summary":"Amazon Linux Security Advisory ALAS2DOCKER-2025-094 vom 2026-01-05","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2ECS-2025-086.html","summary":"Amazon Linux Security Advisory ALAS2ECS-2025-086 vom 2026-01-05","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2ECS-2025-087.html","summary":"Amazon Linux Security Advisory ALAS2ECS-2025-087 vom 2026-01-05","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2ECS-2025-088.html","summary":"Amazon Linux Security Advisory ALAS2ECS-2025-088 vom 2026-01-05","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2ECS-2025-089.html","summary":"Amazon Linux Security Advisory ALAS2ECS-2025-089 vom 2026-01-05","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DOH4RQD6DF6QJ5K5LPUZIBSPIUJOV4WF/","summary":"openSUSE Security Update OPENSUSE-SU-2026:10030-1 vom 2026-01-13","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D4YDMFDXLFWYJ3MDUGV7CSZRLJCE7BFT/","summary":"openSUSE Security Update OPENSUSE-SU-2026:10031-1 vom 2026-01-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:0921","summary":"Red Hat Security Advisory RHSA-2026:0921 vom 2026-01-21","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:0922","summary":"Red Hat Security Advisory RHSA-2026:0922 vom 2026-01-21","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-0923.html","summary":"Oracle Linux Security Advisory ELSA-2026-0923 vom 2026-01-21","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2ECS-2026-094.html","summary":"Amazon Linux Security Advisory ALAS2ECS-2026-094 vom 2026-01-22","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:0923","summary":"Red Hat Security Advisory RHSA-2026:0923 vom 2026-01-21","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-0921.html","summary":"Oracle Linux Security Advisory ELSA-2026-0921 vom 2026-01-21","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2NITRO-ENCLAVES-2026-085.html","summary":"Amazon Linux Security Advisory ALAS2NITRO-ENCLAVES-2026-085 vom 2026-01-22","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-0922.html","summary":"Oracle Linux Security Advisory ELSA-2026-0922 vom 2026-01-21","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:0921","summary":"Rocky Linux Security Advisory RLSA-2026:0921 vom 2026-01-22","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:0923","summary":"Rocky Linux Security Advisory RLSA-2026:0923 vom 2026-01-22","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:1038","summary":"Red Hat Security Advisory RHSA-2026:1038 vom 2026-01-22","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:1017","summary":"Red Hat Security Advisory RHSA-2026:1017 vom 2026-01-22","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:1018","summary":"Red Hat Security Advisory RHSA-2026:1018 vom 2026-01-22","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:1042","summary":"Red Hat Security Advisory RHSA-2026:1042 vom 2026-01-22","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:0922","summary":"Rocky Linux Security Advisory RLSA-2026:0922 vom 2026-01-23","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:1168","summary":"Red Hat Security Advisory RHSA-2026:1168 vom 2026-01-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-January/023924.html","summary":"SUSE Security Update SUSE-SU-2026:0297-1 vom 2026-01-27","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:1249","summary":"Red Hat Security Advisory RHSA-2026:1249 vom 2026-01-26","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5Q63UO2LYEIXNPXRBOE6F42PWFVTQ6LQ/","summary":"SUSE Security Update SUSE-SU-2026:0298-1 vom 2026-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-January/023920.html","summary":"SUSE Security Update SUSE-SU-2026:0296-1 vom 2026-01-26","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:1344","summary":"Red Hat Security Advisory RHSA-2026:1344 vom 2026-01-27","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-1344.html","summary":"Oracle Linux Security Advisory ELSA-2026-1344 vom 2026-01-28","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:1416","summary":"Red Hat Security Advisory RHSA-2026:1416 vom 2026-01-27","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:1431","summary":"Red Hat Security Advisory RHSA-2026:1431 vom 2026-01-27","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:1344","summary":"Rocky Linux Security Advisory RLSA-2026:1344 vom 2026-01-28","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:1497","summary":"Red Hat Security Advisory RHSA-2026:1497 vom 2026-01-28","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:1506","summary":"Red Hat Security Advisory RHSA-2026:1506 vom 2026-01-28","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-January/023937.html","summary":"SUSE Security Update SUSE-SU-2026:0308-1 vom 2026-01-28","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:1518","summary":"Red Hat Security Advisory RHSA-2026:1518 vom 2026-01-29","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-1518.html","summary":"Oracle Linux Security Advisory ELSA-2026-1518 vom 2026-01-29","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:1518","summary":"Rocky Linux Security Advisory RLSA-2026:1518 vom 2026-01-31","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7259319","summary":"IBM Security Bulletin 7259319 vom 2026-01-30","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:1715","summary":"Red Hat Security Advisory RHSA-2026:1715 vom 2026-02-02","category":"external"},{"url":"http://linux.oracle.com/errata/ELSA-2026-1715.html","summary":"Oracle Linux Security Advisory ELSA-2026-1715 vom 2026-02-02","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:1814","summary":"Red Hat Security Advisory RHSA-2026:1814 vom 2026-02-03","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:1813","summary":"Red Hat Security Advisory RHSA-2026:1813 vom 2026-02-03","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:1845","summary":"Red Hat Security Advisory RHSA-2026:1845 vom 2026-02-03","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:1907","summary":"Red Hat Security Advisory RHSA-2026:1907 vom 2026-02-04","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:1938","summary":"Red Hat Security Advisory RHSA-2026:1938 vom 2026-02-04","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:1715","summary":"Rocky Linux Security Advisory RLSA-2026:1715 vom 2026-02-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:1896","summary":"Red Hat Security Advisory RHSA-2026:1896 vom 2026-02-04","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:1942","summary":"Red Hat Security Advisory RHSA-2026:1942 vom 2026-02-04","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:1908","summary":"Rocky Linux Security Advisory RLSA-2026:1908 vom 2026-02-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2149","summary":"Red Hat Security Advisory RHSA-2026:2149 vom 2026-02-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2146","summary":"Red Hat Security Advisory RHSA-2026:2146 vom 2026-02-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2148","summary":"Red Hat Security Advisory RHSA-2026:2148 vom 2026-02-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2144","summary":"Red Hat Security Advisory RHSA-2026:2144 vom 2026-02-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2138","summary":"Red Hat Security Advisory RHSA-2026:2138 vom 2026-02-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2136","summary":"Red Hat Security Advisory RHSA-2026:2136 vom 2026-02-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2133","summary":"Red Hat Security Advisory RHSA-2026:2133 vom 2026-02-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2201","summary":"Red Hat Security Advisory RHSA-2026:2201 vom 2026-02-06","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2124","summary":"Red Hat Security Advisory RHSA-2026:2124 vom 2026-02-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2123","summary":"Red Hat Security Advisory RHSA-2026:2123 vom 2026-02-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2147","summary":"Red Hat Security Advisory RHSA-2026:2147 vom 2026-02-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2218","summary":"Red Hat Security Advisory RHSA-2026:2218 vom 2026-02-09","category":"external"},{"url":"http://linux.oracle.com/errata/ELSA-2026-2124.html","summary":"Oracle Linux Security Advisory ELSA-2026-2124 vom 2026-02-06","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2265","summary":"Red Hat Security Advisory RHSA-2026:2265 vom 2026-02-09","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2223","summary":"Red Hat Security Advisory RHSA-2026:2223 vom 2026-02-09","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2219","summary":"Red Hat Security Advisory RHSA-2026:2219 vom 2026-02-09","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2217","summary":"Red Hat Security Advisory RHSA-2026:2217 vom 2026-02-09","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2323","summary":"Red Hat Security Advisory RHSA-2026:2323 vom 2026-02-09","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2320","summary":"Red Hat Security Advisory RHSA-2026:2320 vom 2026-02-09","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2375","summary":"Red Hat Security Advisory RHSA-2026:2375 vom 2026-02-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2334","summary":"Red Hat Security Advisory RHSA-2026:2334 vom 2026-02-09","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-2323.html","summary":"Oracle Linux Security Advisory ELSA-2026-2323 vom 2026-02-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2343","summary":"Red Hat Security Advisory RHSA-2026:2343 vom 2026-02-09","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2371","summary":"Red Hat Security Advisory RHSA-2026:2371 vom 2026-02-09","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2367","summary":"Red Hat Security Advisory RHSA-2026:2367 vom 2026-02-09","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2374","summary":"Red Hat Security Advisory RHSA-2026:2374 vom 2026-02-09","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2376","summary":"Red Hat Security Advisory RHSA-2026:2376 vom 2026-02-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2441","summary":"Red Hat Security Advisory RHSA-2026:2441 vom 2026-02-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2454","summary":"Red Hat Security Advisory RHSA-2026:2454 vom 2026-02-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2456","summary":"Red Hat Security Advisory RHSA-2026:2456 vom 2026-02-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2572","summary":"Red Hat Security Advisory RHSA-2026:2572 vom 2026-02-11","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2571","summary":"Red Hat Security Advisory RHSA-2026:2571 vom 2026-02-11","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2654","summary":"Red Hat Security Advisory RHSA-2026:2654 vom 2026-02-12","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2762","summary":"Red Hat Security Advisory RHSA-2026:2762 vom 2026-02-16","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2754","summary":"Red Hat Security Advisory RHSA-2026:2754 vom 2026-02-16","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2769","summary":"Red Hat Security Advisory RHSA-2026:2769 vom 2026-02-17","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2675","summary":"Red Hat Security Advisory RHSA-2026:2675 vom 2026-02-16","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2681","summary":"Red Hat Security Advisory RHSA-2026:2681 vom 2026-02-16","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2951","summary":"Red Hat Security Advisory RHSA-2026:2951 vom 2026-02-18","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2927","summary":"Red Hat Security Advisory RHSA-2026:2927 vom 2026-02-18","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-2914.html","summary":"Oracle Linux Security Advisory ELSA-2026-2914 vom 2026-02-19","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-2920.html","summary":"Oracle Linux Security Advisory ELSA-2026-2920 vom 2026-02-19","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3035","summary":"Red Hat Security Advisory RHSA-2026:3035 vom 2026-02-23","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3040","summary":"Red Hat Security Advisory RHSA-2026:3040 vom 2026-02-23","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3111","summary":"Red Hat Security Advisory RHSA-2026:3111 vom 2026-02-23","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3107","summary":"Red Hat Security Advisory RHSA-2026:3107 vom 2026-02-23","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3108","summary":"Red Hat Security Advisory RHSA-2026:3108 vom 2026-02-23","category":"external"},{"url":"http://linux.oracle.com/errata/ELSA-2026-3035.html","summary":"Oracle Linux Security Advisory ELSA-2026-3035 vom 2026-02-24","category":"external"},{"url":"http://linux.oracle.com/errata/ELSA-2026-3040.html","summary":"Oracle Linux Security Advisory ELSA-2026-3040 vom 2026-02-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3087","summary":"Red Hat Security Advisory RHSA-2026:3087 vom 2026-02-23","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3104","summary":"Red Hat Security Advisory RHSA-2026:3104 vom 2026-02-23","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3184","summary":"Red Hat Security Advisory RHSA-2026:3184 vom 2026-02-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3289","summary":"Red Hat Security Advisory RHSA-2026:3289 vom 2026-02-25","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3291","summary":"Red Hat Security Advisory RHSA-2026:3291 vom 2026-02-25","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3288","summary":"Red Hat Security Advisory RHSA-2026:3288 vom 2026-02-25","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3287","summary":"Red Hat Security Advisory RHSA-2026:3287 vom 2026-02-25","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3298","summary":"Red Hat Security Advisory RHSA-2026:3298 vom 2026-02-25","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3297","summary":"Red Hat Security Advisory RHSA-2026:3297 vom 2026-02-25","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3336","summary":"Red Hat Security Advisory RHSA-2026:3336 vom 2026-02-25","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3337","summary":"Red Hat Security Advisory RHSA-2026:3337 vom 2026-02-25","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3343","summary":"Red Hat Security Advisory RHSA-2026:3343 vom 2026-02-25","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-3340.html","summary":"Oracle Linux Security Advisory ELSA-2026-3340 vom 2026-02-25","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-3337.html","summary":"Oracle Linux Security Advisory ELSA-2026-3337 vom 2026-02-26","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-3336.html","summary":"Oracle Linux Security Advisory ELSA-2026-3336 vom 2026-02-25","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-3298.html","summary":"Oracle Linux Security Advisory ELSA-2026-3298 vom 2026-02-26","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-3297.html","summary":"Oracle Linux Security Advisory ELSA-2026-3297 vom 2026-02-25","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-3291.html","summary":"Oracle Linux Security Advisory ELSA-2026-3291 vom 2026-02-25","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3341","summary":"Red Hat Security Advisory RHSA-2026:3341 vom 2026-02-25","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-3341.html","summary":"Oracle Linux Security Advisory ELSA-2026-3341 vom 2026-02-25","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-3343.html","summary":"Oracle Linux Security Advisory ELSA-2026-3343 vom 2026-02-25","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3340","summary":"Red Hat Security Advisory RHSA-2026:3340 vom 2026-02-25","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3428","summary":"Red Hat Security Advisory RHSA-2026:3428 vom 2026-02-26","category":"external"},{"url":"http://linux.oracle.com/errata/ELSA-2026-3428.html","summary":"Oracle Linux Security Advisory ELSA-2026-3428 vom 2026-02-28","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3506","summary":"Red Hat Security Advisory RHSA-2026:3506 vom 2026-03-02","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3713","summary":"Red Hat Security Advisory RHSA-2026:3713 vom 2026-03-04","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3816","summary":"Red Hat Security Advisory RHSA-2026:3816 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3782","summary":"Red Hat Security Advisory RHSA-2026:3782 vom 2026-03-04","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3752","summary":"Red Hat Security Advisory RHSA-2026:3752 vom 2026-03-04","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3815","summary":"Red Hat Security Advisory RHSA-2026:3815 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3820","summary":"Red Hat Security Advisory RHSA-2026:3820 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3753","summary":"Red Hat Security Advisory RHSA-2026:3753 vom 2026-03-04","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3812","summary":"Red Hat Security Advisory RHSA-2026:3812 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3818","summary":"Red Hat Security Advisory RHSA-2026:3818 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3822","summary":"Red Hat Security Advisory RHSA-2026:3822 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3831","summary":"Red Hat Security Advisory RHSA-2026:3831 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3833","summary":"Red Hat Security Advisory RHSA-2026:3833 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3821","summary":"Red Hat Security Advisory RHSA-2026:3821 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3864","summary":"Red Hat Security Advisory RHSA-2026:3864 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3817","summary":"Red Hat Security Advisory RHSA-2026:3817 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3839","summary":"Red Hat Security Advisory RHSA-2026:3839 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3838","summary":"Red Hat Security Advisory RHSA-2026:3838 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3827","summary":"Red Hat Security Advisory RHSA-2026:3827 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3835","summary":"Red Hat Security Advisory RHSA-2026:3835 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3843","summary":"Red Hat Security Advisory RHSA-2026:3843 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3841","summary":"Red Hat Security Advisory RHSA-2026:3841 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3840","summary":"Red Hat Security Advisory RHSA-2026:3840 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3854","summary":"Red Hat Security Advisory RHSA-2026:3854 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3836","summary":"Red Hat Security Advisory RHSA-2026:3836 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3879","summary":"Red Hat Security Advisory RHSA-2026:3879 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3880","summary":"Red Hat Security Advisory RHSA-2026:3880 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3929","summary":"Red Hat Security Advisory RHSA-2026:3929 vom 2026-03-05","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-3753.html","summary":"Oracle Linux Security Advisory ELSA-2026-3753 vom 2026-03-05","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-3928.html","summary":"Oracle Linux Security Advisory ELSA-2026-3928 vom 2026-03-06","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3928","summary":"Red Hat Security Advisory RHSA-2026:3928 vom 2026-03-05","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HI5YBRZT7ZAEECO2GZWZ2NF6FI55BMYW/","summary":"openSUSE Security Update OPENSUSE-SU-2026:20301-1 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3884","summary":"Red Hat Security Advisory RHSA-2026:3884 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3930","summary":"Red Hat Security Advisory RHSA-2026:3930 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3931","summary":"Red Hat Security Advisory RHSA-2026:3931 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3932","summary":"Red Hat Security Advisory RHSA-2026:3932 vom 2026-03-05","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-3752.html","summary":"Oracle Linux Security Advisory ELSA-2026-3752 vom 2026-03-05","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-3864.html","summary":"Oracle Linux Security Advisory ELSA-2026-3864 vom 2026-03-06","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:3928","summary":"Rocky Linux Security Advisory RLSA-2026:3928 vom 2026-03-06","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024646.html","summary":"SUSE Security Update SUSE-SU-2026:20629-1 vom 2026-03-06","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3970","summary":"Red Hat Security Advisory RHSA-2026:3970 vom 2026-03-09","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-3840.html","summary":"Oracle Linux Security Advisory ELSA-2026-3840 vom 2026-03-06","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024649.html","summary":"SUSE Security Update SUSE-SU-2026:20623-1 vom 2026-03-06","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3972","summary":"Red Hat Security Advisory RHSA-2026:3972 vom 2026-03-09","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3973","summary":"Red Hat Security Advisory RHSA-2026:3973 vom 2026-03-09","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3971","summary":"Red Hat Security Advisory RHSA-2026:3971 vom 2026-03-09","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-3839.html","summary":"Oracle Linux Security Advisory ELSA-2026-3839 vom 2026-03-06","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:3864","summary":"Rocky Linux Security Advisory RLSA-2026:3864 vom 2026-03-07","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4166","summary":"Red Hat Security Advisory RHSA-2026:4166 vom 2026-03-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4164","summary":"Red Hat Security Advisory RHSA-2026:4164 vom 2026-03-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4270","summary":"Red Hat Security Advisory RHSA-2026:4270 vom 2026-03-11","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-4164.html","summary":"Oracle Linux Security Advisory ELSA-2026-4164 vom 2026-03-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3905","summary":"Red Hat Security Advisory RHSA-2026:3905 vom 2026-03-11","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4276","summary":"Red Hat Security Advisory RHSA-2026:4276 vom 2026-03-11","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4211","summary":"Red Hat Security Advisory RHSA-2026:4211 vom 2026-03-11","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:4164","summary":"Rocky Linux Security Advisory RLSA-2026:4164 vom 2026-03-11","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4467","summary":"Red Hat Security Advisory RHSA-2026:4467 vom 2026-03-12","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4500","summary":"Red Hat Security Advisory RHSA-2026:4500 vom 2026-03-12","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4753","summary":"Red Hat Security Advisory RHSA-2026:4753 vom 2026-03-17","category":"external"},{"url":"http://linux.oracle.com/errata/ELSA-2026-4672.html","summary":"Oracle Linux Security Advisory ELSA-2026-4672 vom 2026-03-18","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4892","summary":"Red Hat Security Advisory RHSA-2026:4892 vom 2026-03-18","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4907","summary":"Red Hat Security Advisory RHSA-2026:4907 vom 2026-03-18","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4936","summary":"Red Hat Security Advisory RHSA-2026:4936 vom 2026-03-18","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5030","summary":"Red Hat Security Advisory RHSA-2026:5030 vom 2026-03-19","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4901","summary":"Red Hat Security Advisory RHSA-2026:4901 vom 2026-03-18","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5022","summary":"Red Hat Security Advisory RHSA-2026:5022 vom 2026-03-19","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4434","summary":"Red Hat Security Advisory RHSA-2026:4434 vom 2026-03-18","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4952","summary":"Red Hat Security Advisory RHSA-2026:4952 vom 2026-03-19","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4464","summary":"Red Hat Security Advisory RHSA-2026:4464 vom 2026-03-19","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5031","summary":"Red Hat Security Advisory RHSA-2026:5031 vom 2026-03-19","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4510","summary":"Red Hat Security Advisory RHSA-2026:4510 vom 2026-03-19","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5079","summary":"Red Hat Security Advisory RHSA-2026:5079 vom 2026-03-19","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5146","summary":"Red Hat Security Advisory RHSA-2026:5146 vom 2026-03-19","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-5146.html","summary":"Oracle Linux Security Advisory ELSA-2026-5146 vom 2026-03-20","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5078","summary":"Red Hat Security Advisory RHSA-2026:5078 vom 2026-03-20","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5077","summary":"Red Hat Security Advisory RHSA-2026:5077 vom 2026-03-20","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5076","summary":"Red Hat Security Advisory RHSA-2026:5076 vom 2026-03-20","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5327","summary":"Red Hat Security Advisory RHSA-2026:5327 vom 2026-03-23","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5544","summary":"Red Hat Security Advisory RHSA-2026:5544 vom 2026-03-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5461","summary":"Red Hat Security Advisory RHSA-2026:5461 vom 2026-03-23","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5394","summary":"Red Hat Security Advisory RHSA-2026:5394 vom 2026-03-23","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5533","summary":"Red Hat Security Advisory RHSA-2026:5533 vom 2026-03-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5645","summary":"Red Hat Security Advisory RHSA-2026:5645 vom 2026-03-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5636","summary":"Red Hat Security Advisory RHSA-2026:5636 vom 2026-03-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5853","summary":"Red Hat Security Advisory RHSA-2026:5853 vom 2026-03-26","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5852","summary":"Red Hat Security Advisory RHSA-2026:5852 vom 2026-03-26","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5851","summary":"Red Hat Security Advisory RHSA-2026:5851 vom 2026-03-26","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5968","summary":"Red Hat Security Advisory RHSA-2026:5968 vom 2026-03-26","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:5146","summary":"Rocky Linux Security Advisory RLSA-2026:5146 vom 2026-03-27","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6192","summary":"Red Hat Security Advisory RHSA-2026:6192 vom 2026-03-30","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6226","summary":"Red Hat Security Advisory RHSA-2026:6226 vom 2026-03-31","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6184","summary":"Red Hat Security Advisory RHSA-2026:6184 vom 2026-03-30","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6341","summary":"Red Hat Security Advisory RHSA-2026:6341 vom 2026-04-01","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-6382.html","summary":"Oracle Linux Security Advisory ELSA-2026-6382 vom 2026-04-02","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6428","summary":"Red Hat Security Advisory RHSA-2026:6428 vom 2026-04-02","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://groups.google.com/g/golang-announce/c/8FJoBkPddm4","published":"2025-12-02","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"fastlane_seen_at":"2026-04-06T21:01:17.706Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://groups.google.com/g/golang-announce/c/8FJoBkPddm4","added":"2026-04-01T00:00:00.000Z","public_url":"https://groups.google.com/g/golang-announce/c/8FJoBkPddm4","public_source":"BSI","public_source_slug":"bsi","public_published":"2025-12-02","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-w-2025-2724 cve-2025-61727 golang go: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-W-2026-0129","cve":"CVE-2025-61726","title":"Golang Go: Mehrere Schwachstellen","date":"2026-01-15","published":"2026-01-15","updated":"2026-04-01","source_published":"2026-01-15","source_updated":"2026-04-01","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://seclists.org/oss-sec/2026/q1/68","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0129.json","summary":"WID-SEC-W-2026-0129 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0129","summary":"WID-SEC-2026-0129 - Portal Version","category":"self"},{"url":"https://seclists.org/oss-sec/2026/q1/68","summary":"Go 1.25.6 and Go 1.24.12 release notes vom 2026-01-15","category":"external"},{"url":"https://github.com/golang/go/issues/77101","summary":"GitHub Golang Issue 77101 vom 2026-01-15","category":"external"},{"url":"https://github.com/golang/go/issues/77102","summary":"GitHub Golang Issue 77102 vom 2026-01-15","category":"external"},{"url":"https://github.com/golang/go/issues/76443","summary":"GitHub Golang Issue 76443 vom 2026-01-15","category":"external"},{"url":"https://github.com/golang/go/issues/77100","summary":"GitHub Golang Issue 77100 vom 2026-01-15","category":"external"},{"url":"https://github.com/golang/go/issues/77099","summary":"GitHub Golang Issue 77099 vom 2026-01-15","category":"external"},{"url":"https://github.com/golang/go/issues/77113","summary":"GitHub Golang Issue 77113 vom 2026-01-15","category":"external"},{"url":"https://coredns.io/2026/01/15/coredns-1.14.-release/","summary":"CoreDNS-1.14.1 Release Notes vom 2026-01-19","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NH2ETRY5I4475P2G36TA426YNBGAZLJM/","summary":"openSUSE Security Update OPENSUSE-SU-2026:10063-1 vom 2026-01-19","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EJZDHBHKXYC7TOPJZKAU6QZKMN53VSVC/","summary":"openSUSE Security Update OPENSUSE-SU-2026:10064-1 vom 2026-01-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-January/023866.html","summary":"SUSE Security Update SUSE-SU-2026:0219-1 vom 2026-01-22","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-January/023867.html","summary":"SUSE Security Update SUSE-SU-2026:0218-1 vom 2026-01-22","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5Q63UO2LYEIXNPXRBOE6F42PWFVTQ6LQ/","summary":"SUSE Security Update SUSE-SU-2026:0298-1 vom 2026-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-January/023924.html","summary":"SUSE Security Update SUSE-SU-2026:0297-1 vom 2026-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-January/023920.html","summary":"SUSE Security Update SUSE-SU-2026:0296-1 vom 2026-01-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-January/023937.html","summary":"SUSE Security Update SUSE-SU-2026:0308-1 vom 2026-01-28","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-January/023968.html","summary":"SUSE Security Update SUSE-SU-2026:20122-1 vom 2026-01-28","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MQGDE5WRPP6NKEPWSYQ5WAJ54HTZCN45/","summary":"openSUSE Security Update OPENSUSE-SU-2026:10101-1 vom 2026-01-28","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-January/023959.html","summary":"SUSE Security Update SUSE-SU-2026:20132-1 vom 2026-01-28","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YIDNEL2XD2C3R7XQHANV23SKGOE6VLD6/","summary":"openSUSE Security Update OPENSUSE-SU-2026:0032-1 vom 2026-01-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024002.html","summary":"SUSE Security Update SUSE-SU-2026:0354-1 vom 2026-02-02","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2ECS-2026-095.html","summary":"Amazon Linux Security Advisory ALAS2ECS-2026-095 vom 2026-02-06","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2-2026-3135.html","summary":"Amazon Linux Security Advisory ALAS2-2026-3135 vom 2026-02-06","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2-2026-3134.html","summary":"Amazon Linux Security Advisory ALAS2-2026-3134 vom 2026-02-06","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2DOCKER-2026-096.html","summary":"Amazon Linux Security Advisory ALAS2DOCKER-2026-096 vom 2026-02-06","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2-2026-3138.html","summary":"Amazon Linux Security Advisory ALAS2-2026-3138 vom 2026-02-06","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2-2026-3137.html","summary":"Amazon Linux Security Advisory ALAS2-2026-3137 vom 2026-02-06","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2-2026-3136.html","summary":"Amazon Linux Security Advisory ALAS2-2026-3136 vom 2026-02-06","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2-2026-3146.html","summary":"Amazon Linux Security Advisory ALAS2-2026-3146 vom 2026-02-06","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024084.html","summary":"SUSE Security Update SUSE-SU-2026:0403-1 vom 2026-02-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024120.html","summary":"SUSE Security Update SUSE-SU-2026:0426-1 vom 2026-02-11","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024119.html","summary":"SUSE Security Update SUSE-SU-2026:0427-1 vom 2026-02-11","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2708","summary":"Red Hat Security Advisory RHSA-2026:2708 vom 2026-02-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M4EVFYENISTE7WMVDTI7MTPTDXI7IJQ2/","summary":"openSUSE Security Update OPENSUSE-SU-2026:20220-1 vom 2026-02-15","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KQX4ETITXJH3KBGH7YHJSZKMZNKVQRWR/","summary":"openSUSE Security Update OPENSUSE-SU-2026:20214-1 vom 2026-02-14","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2706","summary":"Red Hat Security Advisory RHSA-2026:2706 vom 2026-02-16","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2754","summary":"Red Hat Security Advisory RHSA-2026:2754 vom 2026-02-16","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-2706.html","summary":"Oracle Linux Security Advisory ELSA-2026-2706 vom 2026-02-16","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:2681","summary":"Red Hat Security Advisory RHSA-2026:2681 vom 2026-02-16","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-2709.html","summary":"Oracle Linux Security Advisory ELSA-2026-2709 vom 2026-02-16","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-2708.html","summary":"Oracle Linux Security Advisory ELSA-2026-2708 vom 2026-02-16","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:2708","summary":"Rocky Linux Security Advisory RLSA-2026:2708 vom 2026-02-17","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:2709","summary":"Rocky Linux Security Advisory RLSA-2026:2709 vom 2026-02-17","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:2706","summary":"Rocky Linux Security Advisory RLSA-2026:2706 vom 2026-02-17","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2-2026-3174.html","summary":"Amazon Linux Security Advisory ALAS2-2026-3174 vom 2026-02-19","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2ECS-2026-096.html","summary":"Amazon Linux Security Advisory ALAS2ECS-2026-096 vom 2026-02-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024343.html","summary":"SUSE Security Update SUSE-SU-2026:20429-1 vom 2026-02-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024344.html","summary":"SUSE Security Update SUSE-SU-2026:20428-1 vom 2026-02-18","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2NITRO-ENCLAVES-2026-087.html","summary":"Amazon Linux Security Advisory ALAS2NITRO-ENCLAVES-2026-087 vom 2026-02-19","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2NITRO-ENCLAVES-2026-088.html","summary":"Amazon Linux Security Advisory ALAS2NITRO-ENCLAVES-2026-088 vom 2026-02-19","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2NITRO-ENCLAVES-2026-089.html","summary":"Amazon Linux Security Advisory ALAS2NITRO-ENCLAVES-2026-089 vom 2026-02-19","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2NITRO-ENCLAVES-2026-090.html","summary":"Amazon Linux Security Advisory ALAS2NITRO-ENCLAVES-2026-090 vom 2026-02-19","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2NITRO-ENCLAVES-2026-091.html","summary":"Amazon Linux Security Advisory ALAS2NITRO-ENCLAVES-2026-091 vom 2026-02-19","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2NITRO-ENCLAVES-2026-092.html","summary":"Amazon Linux Security Advisory ALAS2NITRO-ENCLAVES-2026-092 vom 2026-02-19","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-2920.html","summary":"Oracle Linux Security Advisory ELSA-2026-2920 vom 2026-02-19","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-2914.html","summary":"Oracle Linux Security Advisory ELSA-2026-2914 vom 2026-02-19","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I7N2QLT4QQIZC6RCBGA4LQNAUW5NSKRS/","summary":"openSUSE Security Update OPENSUSE-SU-2026:10220-1 vom 2026-02-19","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MP4XIIXIOQEITZJFXXLA5XOCW3MWGG7L/","summary":"openSUSE Security Update OPENSUSE-SU-2026:10224-1 vom 2026-02-19","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3035","summary":"Red Hat Security Advisory RHSA-2026:3035 vom 2026-02-23","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3040","summary":"Red Hat Security Advisory RHSA-2026:3040 vom 2026-02-23","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3089","summary":"Red Hat Security Advisory RHSA-2026:3089 vom 2026-02-23","category":"external"},{"url":"http://linux.oracle.com/errata/ELSA-2026-3092.html","summary":"Oracle Linux Security Advisory ELSA-2026-3092 vom 2026-02-24","category":"external"},{"url":"http://linux.oracle.com/errata/ELSA-2026-3040.html","summary":"Oracle Linux Security Advisory ELSA-2026-3040 vom 2026-02-24","category":"external"},{"url":"http://linux.oracle.com/errata/ELSA-2026-3035.html","summary":"Oracle Linux Security Advisory ELSA-2026-3035 vom 2026-02-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3092","summary":"Red Hat Security Advisory RHSA-2026:3092 vom 2026-02-23","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3192","summary":"Red Hat Security Advisory RHSA-2026:3192 vom 2026-02-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3193","summary":"Red Hat Security Advisory RHSA-2026:3193 vom 2026-02-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3188","summary":"Red Hat Security Advisory RHSA-2026:3188 vom 2026-02-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3187","summary":"Red Hat Security Advisory RHSA-2026:3187 vom 2026-02-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3184","summary":"Red Hat Security Advisory RHSA-2026:3184 vom 2026-02-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3291","summary":"Red Hat Security Advisory RHSA-2026:3291 vom 2026-02-25","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:3092","summary":"Rocky Linux Security Advisory RLSA-2026:3092 vom 2026-02-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3298","summary":"Red Hat Security Advisory RHSA-2026:3298 vom 2026-02-25","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3297","summary":"Red Hat Security Advisory RHSA-2026:3297 vom 2026-02-25","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3337","summary":"Red Hat Security Advisory RHSA-2026:3337 vom 2026-02-25","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-3187.html","summary":"Oracle Linux Security Advisory ELSA-2026-3187 vom 2026-02-25","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3343","summary":"Red Hat Security Advisory RHSA-2026:3343 vom 2026-02-25","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3336","summary":"Red Hat Security Advisory RHSA-2026:3336 vom 2026-02-25","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-3188.html","summary":"Oracle Linux Security Advisory ELSA-2026-3188 vom 2026-02-25","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-3297.html","summary":"Oracle Linux Security Advisory ELSA-2026-3297 vom 2026-02-25","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-3291.html","summary":"Oracle Linux Security Advisory ELSA-2026-3291 vom 2026-02-25","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-3298.html","summary":"Oracle Linux Security Advisory ELSA-2026-3298 vom 2026-02-26","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-3336.html","summary":"Oracle Linux Security Advisory ELSA-2026-3336 vom 2026-02-25","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-3337.html","summary":"Oracle Linux Security Advisory ELSA-2026-3337 vom 2026-02-26","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3340","summary":"Red Hat Security Advisory RHSA-2026:3340 vom 2026-02-25","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-3340.html","summary":"Oracle Linux Security Advisory ELSA-2026-3340 vom 2026-02-25","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-3341.html","summary":"Oracle Linux Security Advisory ELSA-2026-3341 vom 2026-02-25","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-3343.html","summary":"Oracle Linux Security Advisory ELSA-2026-3343 vom 2026-02-25","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3186","summary":"Red Hat Security Advisory RHSA-2026:3186 vom 2026-02-26","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3341","summary":"Red Hat Security Advisory RHSA-2026:3341 vom 2026-02-25","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3427","summary":"Red Hat Security Advisory RHSA-2026:3427 vom 2026-02-26","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2DOCKER-2026-099.html","summary":"Amazon Linux Security Advisory ALAS2DOCKER-2026-099 vom 2026-02-26","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2DOCKER-2026-102.html","summary":"Amazon Linux Security Advisory ALAS2DOCKER-2026-102 vom 2026-02-26","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2DOCKER-2026-101.html","summary":"Amazon Linux Security Advisory ALAS2DOCKER-2026-101 vom 2026-02-26","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2DOCKER-2026-100.html","summary":"Amazon Linux Security Advisory ALAS2DOCKER-2026-100 vom 2026-02-26","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2DOCKER-2026-098.html","summary":"Amazon Linux Security Advisory ALAS2DOCKER-2026-098 vom 2026-02-26","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2DOCKER-2026-097.html","summary":"Amazon Linux Security Advisory ALAS2DOCKER-2026-097 vom 2026-02-26","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:3336","summary":"Rocky Linux Security Advisory RLSA-2026:3336 vom 2026-02-26","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:3337","summary":"Rocky Linux Security Advisory RLSA-2026:3337 vom 2026-02-26","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3459","summary":"Red Hat Security Advisory RHSA-2026:3459 vom 2026-02-27","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:3343","summary":"Rocky Linux Security Advisory RLSA-2026:3343 vom 2026-02-26","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:3341","summary":"Rocky Linux Security Advisory RLSA-2026:3341 vom 2026-02-26","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:3340","summary":"Rocky Linux Security Advisory RLSA-2026:3340 vom 2026-02-26","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:3298","summary":"Rocky Linux Security Advisory RLSA-2026:3298 vom 2026-02-26","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:3297","summary":"Rocky Linux Security Advisory RLSA-2026:3297 vom 2026-02-26","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:3291","summary":"Rocky Linux Security Advisory RLSA-2026:3291 vom 2026-02-26","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:3187","summary":"Rocky Linux Security Advisory RLSA-2026:3187 vom 2026-02-26","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:3188","summary":"Rocky Linux Security Advisory RLSA-2026:3188 vom 2026-02-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024507.html","summary":"SUSE Security Update SUSE-SU-2026:0687-1 vom 2026-02-28","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3506","summary":"Red Hat Security Advisory RHSA-2026:3506 vom 2026-03-02","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3473","summary":"Red Hat Security Advisory RHSA-2026:3473 vom 2026-03-02","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3472","summary":"Red Hat Security Advisory RHSA-2026:3472 vom 2026-03-02","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3470","summary":"Red Hat Security Advisory RHSA-2026:3470 vom 2026-03-02","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3469","summary":"Red Hat Security Advisory RHSA-2026:3469 vom 2026-03-02","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3468","summary":"Red Hat Security Advisory RHSA-2026:3468 vom 2026-03-02","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3489","summary":"Red Hat Security Advisory RHSA-2026:3489 vom 2026-03-02","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3556","summary":"Red Hat Security Advisory RHSA-2026:3556 vom 2026-03-02","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7262283","summary":"IBM Security Bulletin 7262283 vom 2026-03-02","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3559","summary":"Red Hat Security Advisory RHSA-2026:3559 vom 2026-03-02","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3669","summary":"Red Hat Security Advisory RHSA-2026:3669 vom 2026-03-03","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024529.html","summary":"SUSE Security Update SUSE-SU-2026:0789-1 vom 2026-03-03","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3699","summary":"Red Hat Security Advisory RHSA-2026:3699 vom 2026-03-04","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3668","summary":"Red Hat Security Advisory RHSA-2026:3668 vom 2026-03-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024528.html","summary":"SUSE Security Update SUSE-SU-2026:0790-1 vom 2026-03-03","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3416","summary":"Red Hat Security Advisory RHSA-2026:3416 vom 2026-03-04","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-3668.html","summary":"Oracle Linux Security Advisory ELSA-2026-3668 vom 2026-03-03","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024556.html","summary":"SUSE Security Update SUSE-SU-2026:0760-1 vom 2026-03-03","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3831","summary":"Red Hat Security Advisory RHSA-2026:3831 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3833","summary":"Red Hat Security Advisory RHSA-2026:3833 vom 2026-03-05","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-3669.html","summary":"Oracle Linux Security Advisory ELSA-2026-3669 vom 2026-03-04","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3822","summary":"Red Hat Security Advisory RHSA-2026:3822 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3391","summary":"Red Hat Security Advisory RHSA-2026:3391 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3821","summary":"Red Hat Security Advisory RHSA-2026:3821 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3812","summary":"Red Hat Security Advisory RHSA-2026:3812 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3815","summary":"Red Hat Security Advisory RHSA-2026:3815 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3752","summary":"Red Hat Security Advisory RHSA-2026:3752 vom 2026-03-04","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3782","summary":"Red Hat Security Advisory RHSA-2026:3782 vom 2026-03-04","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3753","summary":"Red Hat Security Advisory RHSA-2026:3753 vom 2026-03-04","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3816","summary":"Red Hat Security Advisory RHSA-2026:3816 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3813","summary":"Red Hat Security Advisory RHSA-2026:3813 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3814","summary":"Red Hat Security Advisory RHSA-2026:3814 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3818","summary":"Red Hat Security Advisory RHSA-2026:3818 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3820","summary":"Red Hat Security Advisory RHSA-2026:3820 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3838","summary":"Red Hat Security Advisory RHSA-2026:3838 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3835","summary":"Red Hat Security Advisory RHSA-2026:3835 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3836","summary":"Red Hat Security Advisory RHSA-2026:3836 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3839","summary":"Red Hat Security Advisory RHSA-2026:3839 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3840","summary":"Red Hat Security Advisory RHSA-2026:3840 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3841","summary":"Red Hat Security Advisory RHSA-2026:3841 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3843","summary":"Red Hat Security Advisory RHSA-2026:3843 vom 2026-03-05","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:3668","summary":"Rocky Linux Security Advisory RLSA-2026:3668 vom 2026-03-05","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:3669","summary":"Rocky Linux Security Advisory RLSA-2026:3669 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3817","summary":"Red Hat Security Advisory RHSA-2026:3817 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3854","summary":"Red Hat Security Advisory RHSA-2026:3854 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3864","summary":"Red Hat Security Advisory RHSA-2026:3864 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3874","summary":"Red Hat Security Advisory RHSA-2026:3874 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3869","summary":"Red Hat Security Advisory RHSA-2026:3869 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3879","summary":"Red Hat Security Advisory RHSA-2026:3879 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3880","summary":"Red Hat Security Advisory RHSA-2026:3880 vom 2026-03-05","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-3842.html","summary":"Oracle Linux Security Advisory ELSA-2026-3842 vom 2026-03-05","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-3928.html","summary":"Oracle Linux Security Advisory ELSA-2026-3928 vom 2026-03-06","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-3752.html","summary":"Oracle Linux Security Advisory ELSA-2026-3752 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3898","summary":"Red Hat Security Advisory RHSA-2026:3898 vom 2026-03-05","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2ECS-2026-098.html","summary":"Amazon Linux Security Advisory ALAS2ECS-2026-098 vom 2026-03-06","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3931","summary":"Red Hat Security Advisory RHSA-2026:3931 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3932","summary":"Red Hat Security Advisory RHSA-2026:3932 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3842","summary":"Red Hat Security Advisory RHSA-2026:3842 vom 2026-03-05","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-3753.html","summary":"Oracle Linux Security Advisory ELSA-2026-3753 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3928","summary":"Red Hat Security Advisory RHSA-2026:3928 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3929","summary":"Red Hat Security Advisory RHSA-2026:3929 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3884","summary":"Red Hat Security Advisory RHSA-2026:3884 vom 2026-03-05","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HI5YBRZT7ZAEECO2GZWZ2NF6FI55BMYW/","summary":"openSUSE Security Update OPENSUSE-SU-2026:20301-1 vom 2026-03-05","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2ECS-2026-097.html","summary":"Amazon Linux Security Advisory ALAS2ECS-2026-097 vom 2026-03-06","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2ECS-2026-099.html","summary":"Amazon Linux Security Advisory ALAS2ECS-2026-099 vom 2026-03-06","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3930","summary":"Red Hat Security Advisory RHSA-2026:3930 vom 2026-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3959","summary":"Red Hat Security Advisory RHSA-2026:3959 vom 2026-03-06","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-3864.html","summary":"Oracle Linux Security Advisory ELSA-2026-3864 vom 2026-03-06","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3958","summary":"Red Hat Security Advisory RHSA-2026:3958 vom 2026-03-06","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3960","summary":"Red Hat Security Advisory RHSA-2026:3960 vom 2026-03-06","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:3842","summary":"Rocky Linux Security Advisory RLSA-2026:3842 vom 2026-03-06","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:3928","summary":"Rocky Linux Security Advisory RLSA-2026:3928 vom 2026-03-06","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3971","summary":"Red Hat Security Advisory RHSA-2026:3971 vom 2026-03-09","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3974","summary":"Red Hat Security Advisory RHSA-2026:3974 vom 2026-03-09","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:3864","summary":"Rocky Linux Security Advisory RLSA-2026:3864 vom 2026-03-07","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3973","summary":"Red Hat Security Advisory RHSA-2026:3973 vom 2026-03-09","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3972","summary":"Red Hat Security Advisory RHSA-2026:3972 vom 2026-03-09","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3970","summary":"Red Hat Security Advisory RHSA-2026:3970 vom 2026-03-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024649.html","summary":"SUSE Security Update SUSE-SU-2026:20623-1 vom 2026-03-06","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024646.html","summary":"SUSE Security Update SUSE-SU-2026:20629-1 vom 2026-03-06","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-3840.html","summary":"Oracle Linux Security Advisory ELSA-2026-3840 vom 2026-03-06","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-3839.html","summary":"Oracle Linux Security Advisory ELSA-2026-3839 vom 2026-03-06","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3985","summary":"Red Hat Security Advisory RHSA-2026:3985 vom 2026-03-09","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3977","summary":"Red Hat Security Advisory RHSA-2026:3977 vom 2026-03-09","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-3898.html","summary":"Oracle Linux Security Advisory ELSA-2026-3898 vom 2026-03-09","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-3985.html","summary":"Oracle Linux Security Advisory ELSA-2026-3985 vom 2026-03-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4170","summary":"Red Hat Security Advisory RHSA-2026:4170 vom 2026-03-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4166","summary":"Red Hat Security Advisory RHSA-2026:4166 vom 2026-03-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4164","summary":"Red Hat Security Advisory RHSA-2026:4164 vom 2026-03-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4174","summary":"Red Hat Security Advisory RHSA-2026:4174 vom 2026-03-10","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:3985","summary":"Rocky Linux Security Advisory RLSA-2026:3985 vom 2026-03-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3905","summary":"Red Hat Security Advisory RHSA-2026:3905 vom 2026-03-11","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4270","summary":"Red Hat Security Advisory RHSA-2026:4270 vom 2026-03-11","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4267","summary":"Red Hat Security Advisory RHSA-2026:4267 vom 2026-03-11","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4256","summary":"Red Hat Security Advisory RHSA-2026:4256 vom 2026-03-11","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4264","summary":"Red Hat Security Advisory RHSA-2026:4264 vom 2026-03-11","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4177","summary":"Red Hat Security Advisory RHSA-2026:4177 vom 2026-03-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3851","summary":"Red Hat Security Advisory RHSA-2026:3851 vom 2026-03-11","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3875","summary":"Red Hat Security Advisory RHSA-2026:3875 vom 2026-03-11","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3906","summary":"Red Hat Security Advisory RHSA-2026:3906 vom 2026-03-11","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4220","summary":"Red Hat Security Advisory RHSA-2026:4220 vom 2026-03-10","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-4164.html","summary":"Oracle Linux Security Advisory ELSA-2026-4164 vom 2026-03-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3856","summary":"Red Hat Security Advisory RHSA-2026:3856 vom 2026-03-11","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3855","summary":"Red Hat Security Advisory RHSA-2026:3855 vom 2026-03-11","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4276","summary":"Red Hat Security Advisory RHSA-2026:4276 vom 2026-03-11","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4211","summary":"Red Hat Security Advisory RHSA-2026:4211 vom 2026-03-11","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:4177","summary":"Rocky Linux Security Advisory RLSA-2026:4177 vom 2026-03-11","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:4164","summary":"Rocky Linux Security Advisory RLSA-2026:4164 vom 2026-03-11","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4466","summary":"Red Hat Security Advisory RHSA-2026:4466 vom 2026-03-12","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4467","summary":"Red Hat Security Advisory RHSA-2026:4467 vom 2026-03-12","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4460","summary":"Red Hat Security Advisory RHSA-2026:4460 vom 2026-03-12","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4500","summary":"Red Hat Security Advisory RHSA-2026:4500 vom 2026-03-12","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4672","summary":"Red Hat Security Advisory RHSA-2026:4672 vom 2026-03-17","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:4672","summary":"Rocky Linux Security Advisory RLSA-2026:4672 vom 2026-03-17","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4753","summary":"Red Hat Security Advisory RHSA-2026:4753 vom 2026-03-17","category":"external"},{"url":"http://linux.oracle.com/errata/ELSA-2026-4672.html","summary":"Oracle Linux Security Advisory ELSA-2026-4672 vom 2026-03-18","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4892","summary":"Red Hat Security Advisory RHSA-2026:4892 vom 2026-03-18","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4511","summary":"Red Hat Security Advisory RHSA-2026:4511 vom 2026-03-18","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4435","summary":"Red Hat Security Advisory RHSA-2026:4435 vom 2026-03-18","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4907","summary":"Red Hat Security Advisory RHSA-2026:4907 vom 2026-03-18","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4952","summary":"Red Hat Security Advisory RHSA-2026:4952 vom 2026-03-19","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4901","summary":"Red Hat Security Advisory RHSA-2026:4901 vom 2026-03-18","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4510","summary":"Red Hat Security Advisory RHSA-2026:4510 vom 2026-03-19","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5030","summary":"Red Hat Security Advisory RHSA-2026:5030 vom 2026-03-19","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5031","summary":"Red Hat Security Advisory RHSA-2026:5031 vom 2026-03-19","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4434","summary":"Red Hat Security Advisory RHSA-2026:4434 vom 2026-03-18","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5022","summary":"Red Hat Security Advisory RHSA-2026:5022 vom 2026-03-19","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5079","summary":"Red Hat Security Advisory RHSA-2026:5079 vom 2026-03-19","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5129","summary":"Red Hat Security Advisory RHSA-2026:5129 vom 2026-03-19","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2-2026-3191.html","summary":"Amazon Linux Security Advisory ALAS2-2026-3191 vom 2026-03-19","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2-2026-3207.html","summary":"Amazon Linux Security Advisory ALAS2-2026-3207 vom 2026-03-19","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5078","summary":"Red Hat Security Advisory RHSA-2026:5078 vom 2026-03-20","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5077","summary":"Red Hat Security Advisory RHSA-2026:5077 vom 2026-03-20","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5076","summary":"Red Hat Security Advisory RHSA-2026:5076 vom 2026-03-20","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5132","summary":"Red Hat Security Advisory RHSA-2026:5132 vom 2026-03-19","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5130","summary":"Red Hat Security Advisory RHSA-2026:5130 vom 2026-03-19","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5146","summary":"Red Hat Security Advisory RHSA-2026:5146 vom 2026-03-19","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-5145.html","summary":"Oracle Linux Security Advisory ELSA-2026-5145 vom 2026-03-20","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5131","summary":"Red Hat Security Advisory RHSA-2026:5131 vom 2026-03-19","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-5146.html","summary":"Oracle Linux Security Advisory ELSA-2026-5146 vom 2026-03-20","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5145","summary":"Red Hat Security Advisory RHSA-2026:5145 vom 2026-03-19","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5327","summary":"Red Hat Security Advisory RHSA-2026:5327 vom 2026-03-23","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024783.html","summary":"SUSE Security Update SUSE-SU-2026:0947-1 vom 2026-03-20","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5461","summary":"Red Hat Security Advisory RHSA-2026:5461 vom 2026-03-23","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5452","summary":"Red Hat Security Advisory RHSA-2026:5452 vom 2026-03-23","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5463","summary":"Red Hat Security Advisory RHSA-2026:5463 vom 2026-03-23","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5447","summary":"Red Hat Security Advisory RHSA-2026:5447 vom 2026-03-23","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5544","summary":"Red Hat Security Advisory RHSA-2026:5544 vom 2026-03-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5394","summary":"Red Hat Security Advisory RHSA-2026:5394 vom 2026-03-23","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5549","summary":"Red Hat Security Advisory RHSA-2026:5549 vom 2026-03-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5533","summary":"Red Hat Security Advisory RHSA-2026:5533 vom 2026-03-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5444","summary":"Red Hat Security Advisory RHSA-2026:5444 vom 2026-03-23","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024820.html","summary":"SUSE Security Update SUSE-SU-2026:0977-1 vom 2026-03-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5439","summary":"Red Hat Security Advisory RHSA-2026:5439 vom 2026-03-23","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5645","summary":"Red Hat Security Advisory RHSA-2026:5645 vom 2026-03-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5665","summary":"Red Hat Security Advisory RHSA-2026:5665 vom 2026-03-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5636","summary":"Red Hat Security Advisory RHSA-2026:5636 vom 2026-03-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5649","summary":"Red Hat Security Advisory RHSA-2026:5649 vom 2026-03-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5133","summary":"Red Hat Security Advisory RHSA-2026:5133 vom 2026-03-25","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5851","summary":"Red Hat Security Advisory RHSA-2026:5851 vom 2026-03-26","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5852","summary":"Red Hat Security Advisory RHSA-2026:5852 vom 2026-03-26","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5853","summary":"Red Hat Security Advisory RHSA-2026:5853 vom 2026-03-26","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5941","summary":"Red Hat Security Advisory RHSA-2026:5941 vom 2026-03-26","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5971","summary":"Red Hat Security Advisory RHSA-2026:5971 vom 2026-03-26","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5968","summary":"Red Hat Security Advisory RHSA-2026:5968 vom 2026-03-26","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5952","summary":"Red Hat Security Advisory RHSA-2026:5952 vom 2026-03-26","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5948","summary":"Red Hat Security Advisory RHSA-2026:5948 vom 2026-03-26","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5944","summary":"Red Hat Security Advisory RHSA-2026:5944 vom 2026-03-26","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5943","summary":"Red Hat Security Advisory RHSA-2026:5943 vom 2026-03-26","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5950","summary":"Red Hat Security Advisory RHSA-2026:5950 vom 2026-03-26","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5942","summary":"Red Hat Security Advisory RHSA-2026:5942 vom 2026-03-26","category":"external"},{"url":"http://linux.oracle.com/errata/ELSA-2026-5942.html","summary":"Oracle Linux Security Advisory ELSA-2026-5942 vom 2026-03-27","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-5941.html","summary":"Oracle Linux Security Advisory ELSA-2026-5941 vom 2026-03-26","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-5942.html","summary":"Oracle Linux Security Advisory ELSA-2026-5942 vom 2026-03-27","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:5146","summary":"Rocky Linux Security Advisory RLSA-2026:5146 vom 2026-03-27","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:5145","summary":"Rocky Linux Security Advisory RLSA-2026:5145 vom 2026-03-27","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6226","summary":"Red Hat Security Advisory RHSA-2026:6226 vom 2026-03-31","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6184","summary":"Red Hat Security Advisory RHSA-2026:6184 vom 2026-03-30","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6192","summary":"Red Hat Security Advisory RHSA-2026:6192 vom 2026-03-30","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6251","summary":"Red Hat Security Advisory RHSA-2026:6251 vom 2026-03-31","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6277","summary":"Red Hat Security Advisory RHSA-2026:6277 vom 2026-03-31","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7268161","summary":"IBM Security Bulletin 7268161 vom 2026-03-31","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5907","summary":"Red Hat Security Advisory RHSA-2026:5907 vom 2026-04-01","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5878","summary":"Red Hat Security Advisory RHSA-2026:5878 vom 2026-04-01","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6341","summary":"Red Hat Security Advisory RHSA-2026:6341 vom 2026-04-01","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5876","summary":"Red Hat Security Advisory RHSA-2026:5876 vom 2026-04-01","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6278","summary":"Red Hat Security Advisory RHSA-2026:6278 vom 2026-04-01","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-6382.html","summary":"Oracle Linux Security Advisory ELSA-2026-6382 vom 2026-04-02","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6429","summary":"Red Hat Security Advisory RHSA-2026:6429 vom 2026-04-02","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6428","summary":"Red Hat Security Advisory RHSA-2026:6428 vom 2026-04-02","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://seclists.org/oss-sec/2026/q1/68","published":"2026-01-15","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"fastlane_seen_at":"2026-04-07T09:01:29.157Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://seclists.org/oss-sec/2026/q1/68","added":"2026-04-01T00:00:00.000Z","public_url":"https://seclists.org/oss-sec/2026/q1/68","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-01-15","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-w-2026-0129 cve-2025-61726 golang go: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-W-2026-0353","cve":"CVE-2026-25646","title":"libpng: Schwachstelle ermöglicht Codeausführung","date":"2026-02-09","published":"2026-02-09","updated":"2026-04-01","source_published":"2026-02-09","source_updated":"2026-04-01","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://github.com/pnggroup/libpng/security/advisories/GHSA-g8hp-mq4h-rqm3","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0353.json","summary":"WID-SEC-W-2026-0353 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0353","summary":"WID-SEC-2026-0353 - Portal Version","category":"self"},{"url":"https://github.com/pnggroup/libpng/security/advisories/GHSA-g8hp-mq4h-rqm3","summary":"GitHub Security Advisory vom 2026-02-09","category":"external"},{"url":"https://github.com/pnggroup/libpng/releases/tag/v1.6.55","summary":"GitHub libpng Release 1.6.55 vom 2026-02-09","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8039-1","summary":"Ubuntu Security Notice USN-8039-1 vom 2026-02-13","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8035-1","summary":"Ubuntu Security Notice USN-8035-1 vom 2026-02-12","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-2026-a9ae661fa2","summary":"Fedora Security Advisory FEDORA-2026-A9AE661FA2 vom 2026-02-14","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-2026-168ebcb4a8","summary":"Fedora Security Advisory FEDORA-2026-168EBCB4A8 vom 2026-02-14","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UY37MFVUFDPOWPT7COPSIH2565T72QKO/","summary":"openSUSE Security Update OPENSUSE-SU-2026:10188-1 vom 2026-02-16","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2026/02/msg00020.html","summary":"Debian Security Advisory DLA-4481 vom 2026-02-17","category":"external"},{"url":"https://lists.debian.org/debian-security-announce/2026/msg00047.html","summary":"Debian Security Advisory DSA-6138 vom 2026-02-17","category":"external"},{"url":"https://wiki.securepoint.de/UTM/Changelog","summary":"Securepoint UTM Changelog vom 2026-02-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024363.html","summary":"SUSE Security Update SUSE-SU-2026:0583-1 vom 2026-02-20","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3031","summary":"Red Hat Security Advisory RHSA-2026:3031 vom 2026-02-23","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024367.html","summary":"SUSE Security Update SUSE-SU-2026:0597-1 vom 2026-02-23","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024366.html","summary":"SUSE Security Update SUSE-SU-2026:0598-1 vom 2026-02-23","category":"external"},{"url":"http://linux.oracle.com/errata/ELSA-2026-3031.html","summary":"Oracle Linux Security Advisory ELSA-2026-3031 vom 2026-02-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024368.html","summary":"SUSE Security Update SUSE-SU-2026:0596-1 vom 2026-02-23","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024369.html","summary":"SUSE Security Update SUSE-SU-2026:0599-1 vom 2026-02-24","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:3031","summary":"Rocky Linux Security Advisory RLSA-2026:3031 vom 2026-02-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3405","summary":"Red Hat Security Advisory RHSA-2026:3405 vom 2026-02-26","category":"external"},{"url":"http://linux.oracle.com/errata/ELSA-2026-3405.html","summary":"Oracle Linux Security Advisory ELSA-2026-3405 vom 2026-02-27","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-3405.html","summary":"Oracle Linux Security Advisory ELSA-2026-3405 vom 2026-02-27","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:3405","summary":"Rocky Linux Security Advisory RLSA-2026:3405 vom 2026-02-28","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024499.html","summary":"SUSE Security Update SUSE-SU-2026:20523-1 vom 2026-02-28","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3551","summary":"Red Hat Security Advisory RHSA-2026:3551 vom 2026-03-02","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3573","summary":"Red Hat Security Advisory RHSA-2026:3573 vom 2026-03-03","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3575","summary":"Red Hat Security Advisory RHSA-2026:3575 vom 2026-03-03","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3574","summary":"Red Hat Security Advisory RHSA-2026:3574 vom 2026-03-03","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3577","summary":"Red Hat Security Advisory RHSA-2026:3577 vom 2026-03-02","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-3551.html","summary":"Oracle Linux Security Advisory ELSA-2026-3551 vom 2026-03-03","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3576","summary":"Red Hat Security Advisory RHSA-2026:3576 vom 2026-03-03","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024563.html","summary":"SUSE Security Update SUSE-SU-2026:20530-1 vom 2026-03-04","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:3551","summary":"Rocky Linux Security Advisory RLSA-2026:3551 vom 2026-03-05","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS2-2026-3189.html","summary":"Amazon Linux Security Advisory ALAS2-2026-3189 vom 2026-03-06","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3969","summary":"Red Hat Security Advisory RHSA-2026:3969 vom 2026-03-09","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:3968","summary":"Red Hat Security Advisory RHSA-2026:3968 vom 2026-03-09","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4222","summary":"Red Hat Security Advisory RHSA-2026:4222 vom 2026-03-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4221","summary":"Red Hat Security Advisory RHSA-2026:4221 vom 2026-03-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4306","summary":"Red Hat Security Advisory RHSA-2026:4306 vom 2026-03-11","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8081-1","summary":"Ubuntu Security Notice USN-8081-1 vom 2026-03-12","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:4306","summary":"Rocky Linux Security Advisory RLSA-2026:4306 vom 2026-03-12","category":"external"},{"url":"http://linux.oracle.com/errata/ELSA-2026-4306.html","summary":"Oracle Linux Security Advisory ELSA-2026-4306 vom 2026-03-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4732","summary":"Red Hat Security Advisory RHSA-2026:4732 vom 2026-03-17","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4729","summary":"Red Hat Security Advisory RHSA-2026:4729 vom 2026-03-17","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4728","summary":"Red Hat Security Advisory RHSA-2026:4728 vom 2026-03-17","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4731","summary":"Red Hat Security Advisory RHSA-2026:4731 vom 2026-03-17","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-4728.html","summary":"Oracle Linux Security Advisory ELSA-2026-4728 vom 2026-03-17","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4730","summary":"Red Hat Security Advisory RHSA-2026:4730 vom 2026-03-17","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:4756","summary":"Red Hat Security Advisory RHSA-2026:4756 vom 2026-03-18","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2026:4728","summary":"Rocky Linux Security Advisory RLSA-2026:4728 vom 2026-03-18","category":"external"},{"url":"https://www.dell.com/support/kbdoc/de-de/000443243/dsa-2026-152-dell-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities","summary":"Dell Security Advisory DSA-2026-152 vom 2026-03-23","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:5606","summary":"Red Hat Security Advisory RHSA-2026:5606 vom 2026-03-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024834.html","summary":"SUSE Security Update SUSE-SU-2026:20750-1 vom 2026-03-24","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KBYNGQLXOJ4BNY3MXXZ7KTQ23ASUNL7I/","summary":"openSUSE Security Update OPENSUSE-SU-2026:20378-1 vom 2026-03-25","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-4756.html","summary":"Oracle Linux Security Advisory ELSA-2026-4756 vom 2026-03-27","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-2026-dfa60d30bc","summary":"Fedora Security Advisory FEDORA-2026-DFA60D30BC vom 2026-04-01","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-2026-0192882589","summary":"Fedora Security Advisory FEDORA-2026-0192882589 vom 2026-04-01","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-2026-bcba077d11","summary":"Fedora Security Advisory FEDORA-2026-BCBA077D11 vom 2026-04-01","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-2026-1bf9e14627","summary":"Fedora Security Advisory FEDORA-2026-1BF9E14627 vom 2026-04-01","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-2026-e1669a5881","summary":"Fedora Security Advisory FEDORA-2026-E1669A5881 vom 2026-04-01","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-2026-60fce94678","summary":"Fedora Security Advisory FEDORA-2026-60FCE94678 vom 2026-04-01","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-2026-4e514c1c36","summary":"Fedora Security Advisory FEDORA-2026-4E514C1C36 vom 2026-04-01","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-2026-3adf4e38cb","summary":"Fedora Security Advisory FEDORA-2026-3ADF4E38CB vom 2026-04-01","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:6439","summary":"RedHat Security Advisory","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://github.com/pnggroup/libpng/security/advisories/GHSA-g8hp-mq4h-rqm3","published":"2026-02-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"fastlane_seen_at":"2026-04-07T09:01:29.157Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://github.com/pnggroup/libpng/security/advisories/GHSA-g8hp-mq4h-rqm3","added":"2026-04-01T00:00:00.000Z","public_url":"https://github.com/pnggroup/libpng/security/advisories/GHSA-g8hp-mq4h-rqm3","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-02-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-w-2026-0353 cve-2026-25646 libpng: schwachstelle ermöglicht codeausführung bsi bsi"},{"id":"CVE-2020-25576","cve":"CVE-2020-25576","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-25576","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-25576","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-25576","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-25576","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-25576","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2020-25576 cve-2020-25576 mariner microsoft msrc msrc"},{"id":"CVE-2020-26160","cve":"CVE-2020-26160","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-26160","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-26160","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-26160","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-26160","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-26160","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2020-26160 cve-2020-26160 mariner microsoft msrc msrc"},{"id":"CVE-2020-27814","cve":"CVE-2020-27814","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-27814","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-27814","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-27814","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-27814","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-27814","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2020-27814 cve-2020-27814 mariner microsoft msrc msrc"},{"id":"CVE-2020-27823","cve":"CVE-2020-27823","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-27823","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-27823","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-27823","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-27823","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-27823","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2020-27823 cve-2020-27823 mariner microsoft msrc msrc"},{"id":"CVE-2020-27824","cve":"CVE-2020-27824","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-27824","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-27824","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-27824","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-27824","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-27824","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2020-27824 cve-2020-27824 mariner microsoft msrc msrc"},{"id":"CVE-2020-27841","cve":"CVE-2020-27841","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-27841","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-27841","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-27841","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-27841","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-27841","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2020-27841 cve-2020-27841 mariner microsoft msrc msrc"},{"id":"CVE-2020-27842","cve":"CVE-2020-27842","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-27842","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-27842","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-27842","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-27842","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-27842","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2020-27842 cve-2020-27842 mariner microsoft msrc msrc"},{"id":"CVE-2020-27843","cve":"CVE-2020-27843","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-27843","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-27843","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-27843","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-27843","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-27843","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2020-27843 cve-2020-27843 mariner microsoft msrc msrc"},{"id":"CVE-2020-27845","cve":"CVE-2020-27845","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-27845","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-27845","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-27845","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-27845","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-27845","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2020-27845 cve-2020-27845 mariner microsoft msrc msrc"},{"id":"CVE-2020-28362","cve":"CVE-2020-28362","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-28362","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-28362","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-28362","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-28362","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-28362","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2020-28362 cve-2020-28362 mariner microsoft msrc msrc"},{"id":"CVE-2020-28367","cve":"CVE-2020-28367","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-28367","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-28367","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-28367","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-28367","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-28367","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2020-28367 cve-2020-28367 mariner microsoft msrc msrc"},{"id":"CVE-2020-28851","cve":"CVE-2020-28851","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-28851","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-28851","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-28851","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-28851","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-28851","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2020-28851 cve-2020-28851 mariner microsoft msrc msrc"},{"id":"CVE-2020-28852","cve":"CVE-2020-28852","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-28852","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-28852","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-28852","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-28852","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-28852","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2020-28852 cve-2020-28852 mariner microsoft msrc msrc"},{"id":"CVE-2020-8112","cve":"CVE-2020-8112","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-8112","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-8112","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-8112","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-8112","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-8112","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2020-8112 cve-2020-8112 mariner microsoft msrc msrc"},{"id":"CVE-2020-8597","cve":"CVE-2020-8597","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-8597","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-8597","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-8597","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-8597","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-8597","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2020-8597 cve-2020-8597 mariner microsoft msrc msrc"},{"id":"CVE-2021-20270","cve":"CVE-2021-20270","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-20270","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-20270","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-20270","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-20270","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-20270","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2021-20270 cve-2021-20270 mariner microsoft msrc msrc"},{"id":"CVE-2021-22569","cve":"CVE-2021-22569","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-22569","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-22569","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-22569","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-22569","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-22569","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2021-22569 cve-2021-22569 mariner microsoft msrc msrc"},{"id":"CVE-2021-27291","cve":"CVE-2021-27291","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-27291","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-27291","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-27291","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-27291","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-27291","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2021-27291 cve-2021-27291 mariner microsoft msrc msrc"},{"id":"CVE-2021-27918","cve":"CVE-2021-27918","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-27918","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-27918","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-27918","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-27918","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-27918","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2021-27918 cve-2021-27918 mariner microsoft msrc msrc"},{"id":"CVE-2021-29923","cve":"CVE-2021-29923","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-29923","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-29923","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-29923","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-29923","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-29923","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2021-29923 cve-2021-29923 mariner microsoft msrc msrc"},{"id":"CVE-2021-3114","cve":"CVE-2021-3114","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-3114","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-3114","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-3114","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-3114","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-3114","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2021-3114 cve-2021-3114 mariner microsoft msrc msrc"},{"id":"CVE-2021-32714","cve":"CVE-2021-32714","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-32714","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-32714","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-32714","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.1,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-32714","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-32714","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2021-32714 cve-2021-32714 mariner microsoft msrc msrc"},{"id":"CVE-2021-32715","cve":"CVE-2021-32715","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-32715","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-32715","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-32715","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.3,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-32715","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-32715","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2021-32715 cve-2021-32715 mariner microsoft msrc msrc"},{"id":"CVE-2021-32923","cve":"CVE-2021-32923","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-32923","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-32923","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-32923","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.4,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-32923","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-32923","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2021-32923 cve-2021-32923 mariner microsoft msrc msrc"},{"id":"CVE-2021-33195","cve":"CVE-2021-33195","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-33195","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-33195","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-33195","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.3,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-33195","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-33195","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2021-33195 cve-2021-33195 mariner microsoft msrc msrc"},{"id":"CVE-2021-33196","cve":"CVE-2021-33196","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-33196","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-33196","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-33196","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-33196","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-33196","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2021-33196 cve-2021-33196 mariner microsoft msrc msrc"},{"id":"CVE-2021-33197","cve":"CVE-2021-33197","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-33197","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-33197","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-33197","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.3,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-33197","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-33197","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2021-33197 cve-2021-33197 mariner microsoft msrc msrc"},{"id":"CVE-2021-33198","cve":"CVE-2021-33198","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-33198","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-33198","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-33198","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-33198","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-33198","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2021-33198 cve-2021-33198 mariner microsoft msrc msrc"},{"id":"CVE-2021-33454","cve":"CVE-2021-33454","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-33454","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-33454","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-33454","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-33454","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-33454","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2021-33454 cve-2021-33454 mariner microsoft msrc msrc"},{"id":"CVE-2021-3611","cve":"CVE-2021-3611","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-3611","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-3611","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-3611","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-3611","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-3611","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2021-3611 cve-2021-3611 mariner microsoft msrc msrc"},{"id":"CVE-2021-3712","cve":"CVE-2021-3712","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-3712","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-3712","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-3712","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.4,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-3712","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-3712","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2021-3712 cve-2021-3712 mariner microsoft msrc msrc"},{"id":"CVE-2021-3750","cve":"CVE-2021-3750","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-3750","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-3750","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-3750","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.2,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-3750","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-3750","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2021-3750 cve-2021-3750 mariner microsoft msrc msrc"},{"id":"CVE-2021-38561","cve":"CVE-2021-38561","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-38561","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-38561","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-38561","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-38561","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-38561","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2021-38561 cve-2021-38561 mariner microsoft msrc msrc"},{"id":"CVE-2021-3929","cve":"CVE-2021-3929","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-3929","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-3929","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-3929","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.2,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-3929","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-3929","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2021-3929 cve-2021-3929 mariner microsoft msrc msrc"},{"id":"CVE-2021-4158","cve":"CVE-2021-4158","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-4158","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-4158","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-4158","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-4158","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-4158","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2021-4158 cve-2021-4158 mariner microsoft msrc msrc"},{"id":"CVE-2021-4160","cve":"CVE-2021-4160","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-4160","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-4160","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-4160","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.9,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-4160","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-4160","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2021-4160 cve-2021-4160 mariner microsoft msrc msrc"},{"id":"CVE-2021-41771","cve":"CVE-2021-41771","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-41771","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-41771","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-41771","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-41771","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-41771","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2021-41771 cve-2021-41771 mariner microsoft msrc msrc"},{"id":"CVE-2021-41772","cve":"CVE-2021-41772","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-41772","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-41772","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-41772","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-41772","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-41772","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2021-41772 cve-2021-41772 mariner microsoft msrc msrc"},{"id":"CVE-2021-4206","cve":"CVE-2021-4206","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-4206","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-4206","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-4206","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.2,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-4206","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-4206","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2021-4206 cve-2021-4206 mariner microsoft msrc msrc"},{"id":"CVE-2021-4207","cve":"CVE-2021-4207","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-4207","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-4207","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-4207","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.2,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-4207","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-4207","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2021-4207 cve-2021-4207 mariner microsoft msrc msrc"},{"id":"CVE-2021-42836","cve":"CVE-2021-42836","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-42836","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-42836","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-42836","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-42836","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-42836","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2021-42836 cve-2021-42836 mariner microsoft msrc msrc"},{"id":"CVE-2021-44716","cve":"CVE-2021-44716","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-44716","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-44716","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-44716","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-44716","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-44716","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2021-44716 cve-2021-44716 mariner microsoft msrc msrc"},{"id":"CVE-2021-45707","cve":"CVE-2021-45707","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-45707","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-45707","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-45707","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-45707","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-45707","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2021-45707 cve-2021-45707 mariner microsoft msrc msrc"},{"id":"CVE-2021-47323","cve":"CVE-2021-47323","title":"watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff()","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-47323","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-47323","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-47323","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-47323","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-47323","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2021-47323 cve-2021-47323 watchdog: sc520_wdt: fix possible use-after-free in wdt_turnoff() microsoft msrc msrc"},{"id":"CVE-2021-47324","cve":"CVE-2021-47324","title":"watchdog: Fix possible use-after-free in wdt_startup()","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-47324","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-47324","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-47324","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-47324","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-47324","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2021-47324 cve-2021-47324 watchdog: fix possible use-after-free in wdt_startup() microsoft msrc msrc"},{"id":"CVE-2021-47432","cve":"CVE-2021-47432","title":"lib/generic-radix-tree.c: Don't overflow in peek()","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-47432","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-47432","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-47432","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-47432","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-47432","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2021-47432 cve-2021-47432 lib/generic-radix-tree.c: don't overflow in peek() microsoft msrc msrc"},{"id":"CVE-2021-47482","cve":"CVE-2021-47482","title":"net: batman-adv: fix error handling","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-47482","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-47482","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-47482","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.3,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-47482","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-47482","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2021-47482 cve-2021-47482 net: batman-adv: fix error handling microsoft msrc msrc"},{"id":"CVE-2022-0358","cve":"CVE-2022-0358","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0358","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0358","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0358","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0358","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0358","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2022-0358 cve-2022-0358 mariner microsoft msrc msrc"},{"id":"CVE-2022-0778","cve":"CVE-2022-0778","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0778","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0778","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0778","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0778","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0778","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2022-0778 cve-2022-0778 mariner microsoft msrc msrc"},{"id":"CVE-2022-1292","cve":"CVE-2022-1292","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-1292","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-1292","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-1292","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-1292","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-1292","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2022-1292 cve-2022-1292 mariner microsoft msrc msrc"},{"id":"CVE-2022-1996","cve":"CVE-2022-1996","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-1996","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-1996","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-1996","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.1,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-1996","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-1996","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2022-1996 cve-2022-1996 mariner microsoft msrc msrc"},{"id":"CVE-2022-2097","cve":"CVE-2022-2097","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2097","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2097","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2097","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.3,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2097","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2097","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2022-2097 cve-2022-2097 mariner microsoft msrc msrc"},{"id":"CVE-2022-21698","cve":"CVE-2022-21698","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21698","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21698","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21698","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21698","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21698","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2022-21698 cve-2022-21698 mariner microsoft msrc msrc"},{"id":"CVE-2022-23523","cve":"CVE-2022-23523","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23523","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23523","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23523","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23523","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23523","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2022-23523 cve-2022-23523 mariner microsoft msrc msrc"},{"id":"CVE-2022-23639","cve":"CVE-2022-23639","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23639","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23639","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23639","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.1,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23639","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23639","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2022-23639 cve-2022-23639 mariner microsoft msrc msrc"},{"id":"CVE-2022-23772","cve":"CVE-2022-23772","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23772","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23772","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23772","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23772","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23772","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2022-23772 cve-2022-23772 mariner microsoft msrc msrc"},{"id":"CVE-2022-23773","cve":"CVE-2022-23773","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23773","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23773","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23773","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23773","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23773","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2022-23773 cve-2022-23773 mariner microsoft msrc msrc"},{"id":"CVE-2022-23806","cve":"CVE-2022-23806","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23806","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23806","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23806","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.1,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23806","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23806","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2022-23806 cve-2022-23806 mariner microsoft msrc msrc"},{"id":"CVE-2022-24713","cve":"CVE-2022-24713","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24713","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24713","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24713","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24713","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24713","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2022-24713 cve-2022-24713 mariner microsoft msrc msrc"},{"id":"CVE-2022-24795","cve":"CVE-2022-24795","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24795","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24795","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24795","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24795","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24795","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2022-24795 cve-2022-24795 mariner microsoft msrc msrc"},{"id":"CVE-2022-24921","cve":"CVE-2022-24921","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24921","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24921","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24921","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24921","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24921","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2022-24921 cve-2022-24921 mariner microsoft msrc msrc"},{"id":"CVE-2022-26353","cve":"CVE-2022-26353","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26353","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26353","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26353","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26353","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26353","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2022-26353 cve-2022-26353 mariner microsoft msrc msrc"},{"id":"CVE-2022-26354","cve":"CVE-2022-26354","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26354","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26354","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26354","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":3.2,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26354","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26354","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2022-26354 cve-2022-26354 mariner microsoft msrc msrc"},{"id":"CVE-2022-2879","cve":"CVE-2022-2879","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2879","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2879","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2879","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2879","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2879","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2022-2879 cve-2022-2879 mariner microsoft msrc msrc"},{"id":"CVE-2022-2928","cve":"CVE-2022-2928","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2928","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2928","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2928","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2928","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2928","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2022-2928 cve-2022-2928 mariner microsoft msrc msrc"},{"id":"CVE-2022-2929","cve":"CVE-2022-2929","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2929","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2929","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2929","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2929","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2929","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2022-2929 cve-2022-2929 mariner microsoft msrc msrc"},{"id":"CVE-2022-2962","cve":"CVE-2022-2962","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2962","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2962","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2962","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2962","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2962","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2022-2962 cve-2022-2962 mariner microsoft msrc msrc"},{"id":"CVE-2022-31627","cve":"CVE-2022-31627","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-31627","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-31627","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-31627","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-31627","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-31627","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2022-31627 cve-2022-31627 mariner microsoft msrc msrc"},{"id":"CVE-2022-3165","cve":"CVE-2022-3165","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-3165","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-3165","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-3165","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-3165","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-3165","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2022-3165 cve-2022-3165 mariner microsoft msrc msrc"},{"id":"CVE-2022-3171","cve":"CVE-2022-3171","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-3171","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-3171","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-3171","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-3171","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-3171","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2022-3171 cve-2022-3171 mariner microsoft msrc msrc"},{"id":"CVE-2022-33065","cve":"CVE-2022-33065","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33065","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33065","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33065","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33065","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33065","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2022-33065 cve-2022-33065 mariner microsoft msrc msrc"},{"id":"CVE-2022-33099","cve":"CVE-2022-33099","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33099","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33099","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33099","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33099","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33099","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2022-33099 cve-2022-33099 mariner microsoft msrc msrc"},{"id":"CVE-2022-3509","cve":"CVE-2022-3509","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-3509","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-3509","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-3509","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-3509","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-3509","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2022-3509 cve-2022-3509 mariner microsoft msrc msrc"},{"id":"CVE-2022-35414","cve":"CVE-2022-35414","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35414","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35414","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35414","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35414","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35414","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2022-35414 cve-2022-35414 mariner microsoft msrc msrc"},{"id":"CVE-2022-36648","cve":"CVE-2022-36648","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-36648","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-36648","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-36648","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":10,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-36648","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-36648","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2022-36648 cve-2022-36648 mariner microsoft msrc msrc"},{"id":"CVE-2022-36763","cve":"CVE-2022-36763","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-36763","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-36763","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-36763","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-36763","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-36763","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2022-36763 cve-2022-36763 mariner microsoft msrc msrc"},{"id":"CVE-2022-36764","cve":"CVE-2022-36764","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-36764","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-36764","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-36764","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-36764","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-36764","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2022-36764 cve-2022-36764 mariner microsoft msrc msrc"},{"id":"CVE-2022-36765","cve":"CVE-2022-36765","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-36765","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-36765","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-36765","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-36765","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-36765","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2022-36765 cve-2022-36765 mariner microsoft msrc msrc"},{"id":"CVE-2022-37434","cve":"CVE-2022-37434","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37434","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37434","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37434","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37434","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37434","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2022-37434 cve-2022-37434 mariner microsoft msrc msrc"},{"id":"CVE-2022-3872","cve":"CVE-2022-3872","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-3872","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-3872","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-3872","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.6,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-3872","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-3872","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2022-3872 cve-2022-3872 mariner microsoft msrc msrc"},{"id":"CVE-2022-4144","cve":"CVE-2022-4144","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-4144","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-4144","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-4144","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-4144","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-4144","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2022-4144 cve-2022-4144 mariner microsoft msrc msrc"},{"id":"CVE-2022-46146","cve":"CVE-2022-46146","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-46146","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-46146","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-46146","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-46146","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-46146","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2022-46146 cve-2022-46146 mariner microsoft msrc msrc"},{"id":"CVE-2022-46175","cve":"CVE-2022-46175","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-46175","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-46175","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-46175","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-46175","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-46175","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2022-46175 cve-2022-46175 mariner microsoft msrc msrc"},{"id":"CVE-2022-48669","cve":"CVE-2022-48669","title":"powerpc/pseries: Fix potential memleak in papr_get_attr()","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-48669","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-48669","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-48669","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-48669","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-48669","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2022-48669 cve-2022-48669 powerpc/pseries: fix potential memleak in papr_get_attr() microsoft msrc msrc"},{"id":"CVE-2022-48670","cve":"CVE-2022-48670","title":"peci: cpu: Fix use-after-free in adev_release()","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-48670","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-48670","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-48670","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-48670","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-48670","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2022-48670 cve-2022-48670 peci: cpu: fix use-after-free in adev_release() microsoft msrc msrc"},{"id":"CVE-2022-48788","cve":"CVE-2022-48788","title":"nvme-rdma: fix possible use-after-free in transport error_recovery work","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-48788","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-48788","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-48788","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-48788","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-48788","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2022-48788 cve-2022-48788 nvme-rdma: fix possible use-after-free in transport error_recovery work microsoft msrc msrc"},{"id":"CVE-2022-48816","cve":"CVE-2022-48816","title":"SUNRPC: lock against -&gt;sock changing during sysfs read","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-48816","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-48816","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-48816","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.7,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-48816","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-48816","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2022-48816 cve-2022-48816 sunrpc: lock against -&gt;sock changing during sysfs read microsoft msrc msrc"},{"id":"CVE-2022-48833","cve":"CVE-2022-48833","title":"btrfs: skip reserved bytes warning on unmount after log cleanup failure","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-48833","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-48833","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-48833","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-48833","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-48833","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2022-48833 cve-2022-48833 btrfs: skip reserved bytes warning on unmount after log cleanup failure microsoft msrc msrc"},{"id":"CVE-2022-48841","cve":"CVE-2022-48841","title":"ice: fix NULL pointer dereference in ice_update_vsi_tx_ring_stats()","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-48841","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-48841","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-48841","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-48841","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-48841","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2022-48841 cve-2022-48841 ice: fix null pointer dereference in ice_update_vsi_tx_ring_stats() microsoft msrc msrc"},{"id":"CVE-2022-48843","cve":"CVE-2022-48843","title":"drm/vrr: Set VRR capable prop only if it is attached to connector","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-48843","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-48843","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-48843","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-48843","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-48843","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2022-48843 cve-2022-48843 drm/vrr: set vrr capable prop only if it is attached to connector microsoft msrc msrc"},{"id":"CVE-2022-49043","cve":"CVE-2022-49043","title":"xmlXIncludeAddNode in xinclude.c in libxml2 before 2.11.0 has a use-after-free.","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49043","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49043","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49043","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.1,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49043","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49043","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2022-49043 cve-2022-49043 xmlxincludeaddnode in xinclude.c in libxml2 before 2.11.0 has a use-after-free. microsoft msrc msrc"},{"id":"CVE-2023-0464","cve":"CVE-2023-0464","title":"OpenSSL: CVE-2023-0464 Excessive Resource Usage Verifying X.509 Policy Constraints","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-0464","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-0464","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-0464","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-0464","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-0464","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2023-0464 cve-2023-0464 openssl: cve-2023-0464 excessive resource usage verifying x.509 policy constraints microsoft msrc msrc"},{"id":"CVE-2023-1544","cve":"CVE-2023-1544","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1544","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1544","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1544","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.3,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1544","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1544","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2023-1544 cve-2023-1544 mariner microsoft msrc msrc"},{"id":"CVE-2023-22742","cve":"CVE-2023-22742","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-22742","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-22742","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-22742","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.9,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-22742","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-22742","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2023-22742 cve-2023-22742 mariner microsoft msrc msrc"},{"id":"CVE-2023-24531","cve":"CVE-2023-24531","title":"Output of \"go env\" does not sanitize values in cmd/go","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24531","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24531","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24531","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24531","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24531","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2023-24531 cve-2023-24531 output of \"go env\" does not sanitize values in cmd/go microsoft msrc msrc"},{"id":"CVE-2023-25165","cve":"CVE-2023-25165","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-25165","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-25165","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-25165","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.3,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-25165","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-25165","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2023-25165 cve-2023-25165 mariner microsoft msrc msrc"},{"id":"CVE-2023-26253","cve":"CVE-2023-26253","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-26253","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-26253","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-26253","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-26253","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-26253","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2023-26253 cve-2023-26253 mariner microsoft msrc msrc"},{"id":"CVE-2023-2650","cve":"CVE-2023-2650","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-2650","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-2650","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-2650","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-2650","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-2650","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2023-2650 cve-2023-2650 mariner microsoft msrc msrc"},{"id":"CVE-2023-26964","cve":"CVE-2023-26964","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-26964","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-26964","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-26964","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-26964","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-26964","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2023-26964 cve-2023-26964 mariner microsoft msrc msrc"},{"id":"CVE-2023-27478","cve":"CVE-2023-27478","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-27478","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-27478","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-27478","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-27478","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-27478","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2023-27478 cve-2023-27478 mariner microsoft msrc msrc"},{"id":"CVE-2023-27533","cve":"CVE-2023-27533","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-27533","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-27533","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-27533","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-27533","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-27533","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2023-27533 cve-2023-27533 mariner microsoft msrc msrc"},{"id":"CVE-2023-27534","cve":"CVE-2023-27534","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-27534","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-27534","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-27534","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-27534","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-27534","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2023-27534 cve-2023-27534 mariner microsoft msrc msrc"},{"id":"CVE-2023-2861","cve":"CVE-2023-2861","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-2861","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-2861","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-2861","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-2861","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-2861","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2023-2861 cve-2023-2861 mariner microsoft msrc msrc"},{"id":"CVE-2023-2953","cve":"CVE-2023-2953","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-2953","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-2953","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-2953","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-2953","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-2953","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2023-2953 cve-2023-2953 mariner microsoft msrc msrc"},{"id":"CVE-2023-2976","cve":"CVE-2023-2976","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-2976","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-2976","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-2976","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-2976","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-2976","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2023-2976 cve-2023-2976 mariner microsoft msrc msrc"},{"id":"CVE-2023-3180","cve":"CVE-2023-3180","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-3180","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-3180","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-3180","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-3180","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-3180","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2023-3180 cve-2023-3180 mariner microsoft msrc msrc"},{"id":"CVE-2023-32324","cve":"CVE-2023-32324","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32324","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32324","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32324","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32324","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32324","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2023-32324 cve-2023-32324 mariner microsoft msrc msrc"},{"id":"CVE-2023-3255","cve":"CVE-2023-3255","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-3255","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-3255","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-3255","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-3255","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-3255","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2023-3255 cve-2023-3255 mariner microsoft msrc msrc"},{"id":"CVE-2023-3301","cve":"CVE-2023-3301","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-3301","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-3301","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-3301","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.6,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-3301","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-3301","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2023-3301 cve-2023-3301 mariner microsoft msrc msrc"},{"id":"CVE-2023-3354","cve":"CVE-2023-3354","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-3354","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-3354","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-3354","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-3354","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-3354","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2023-3354 cve-2023-3354 mariner microsoft msrc msrc"},{"id":"CVE-2023-33976","cve":"CVE-2023-33976","title":"TensorFlow segfault in array_ops.upper_bound","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33976","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33976","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33976","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33976","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33976","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2023-33976 cve-2023-33976 tensorflow segfault in array_ops.upper_bound microsoft msrc msrc"},{"id":"CVE-2023-34241","cve":"CVE-2023-34241","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-34241","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-34241","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-34241","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-34241","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-34241","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2023-34241 cve-2023-34241 mariner microsoft msrc msrc"},{"id":"CVE-2023-4039","cve":"CVE-2023-4039","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4039","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4039","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4039","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4039","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4039","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2023-4039 cve-2023-4039 mariner microsoft msrc msrc"},{"id":"CVE-2023-4133","cve":"CVE-2023-4133","title":"Mariner","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4133","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4133","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4133","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4133","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4133","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2023-4133 cve-2023-4133 mariner microsoft msrc msrc"},{"id":"CVE-2023-42282","cve":"CVE-2023-42282","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-42282","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-42282","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-42282","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-42282","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-42282","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2023-42282 cve-2023-42282 mariner microsoft msrc msrc"},{"id":"CVE-2023-42363","cve":"CVE-2023-42363","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-42363","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-42363","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-42363","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-42363","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-42363","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2023-42363 cve-2023-42363 mariner microsoft msrc msrc"},{"id":"CVE-2023-42365","cve":"CVE-2023-42365","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-42365","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-42365","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-42365","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-42365","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-42365","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2023-42365 cve-2023-42365 mariner microsoft msrc msrc"},{"id":"CVE-2023-42467","cve":"CVE-2023-42467","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-42467","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-42467","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-42467","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-42467","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-42467","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2023-42467 cve-2023-42467 mariner microsoft msrc msrc"},{"id":"CVE-2023-43040","cve":"CVE-2023-43040","title":"IBM Spectrum Fusion HCI improper access control","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-43040","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-43040","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-43040","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-43040","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-43040","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2023-43040 cve-2023-43040 ibm spectrum fusion hci improper access control microsoft msrc msrc"},{"id":"CVE-2023-43804","cve":"CVE-2023-43804","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-43804","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-43804","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-43804","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.1,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-43804","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-43804","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2023-43804 cve-2023-43804 mariner microsoft msrc msrc"},{"id":"CVE-2023-4504","cve":"CVE-2023-4504","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4504","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4504","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4504","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4504","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4504","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2023-4504 cve-2023-4504 mariner microsoft msrc msrc"},{"id":"CVE-2023-45142","cve":"CVE-2023-45142","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-45142","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-45142","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-45142","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-45142","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-45142","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2023-45142 cve-2023-45142 mariner microsoft msrc msrc"},{"id":"CVE-2023-45230","cve":"CVE-2023-45230","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-45230","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-45230","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-45230","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-45230","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-45230","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2023-45230 cve-2023-45230 mariner microsoft msrc msrc"},{"id":"CVE-2023-45232","cve":"CVE-2023-45232","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-45232","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-45232","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-45232","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-45232","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-45232","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2023-45232 cve-2023-45232 mariner microsoft msrc msrc"},{"id":"CVE-2023-45233","cve":"CVE-2023-45233","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-45233","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-45233","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-45233","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-45233","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-45233","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2023-45233 cve-2023-45233 mariner microsoft msrc msrc"},{"id":"CVE-2023-45234","cve":"CVE-2023-45234","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-45234","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-45234","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-45234","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-45234","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-45234","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2023-45234 cve-2023-45234 mariner microsoft msrc msrc"},{"id":"CVE-2023-45235","cve":"CVE-2023-45235","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-45235","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-45235","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-45235","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-45235","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-45235","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2023-45235 cve-2023-45235 mariner microsoft msrc msrc"},{"id":"CVE-2023-45236","cve":"CVE-2023-45236","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-45236","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-45236","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-45236","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-45236","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-45236","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2023-45236 cve-2023-45236 mariner microsoft msrc msrc"},{"id":"CVE-2023-45237","cve":"CVE-2023-45237","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-45237","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-45237","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-45237","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-45237","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-45237","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2023-45237 cve-2023-45237 mariner microsoft msrc msrc"},{"id":"CVE-2023-45853","cve":"CVE-2023-45853","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-45853","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-45853","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-45853","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-45853","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-45853","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2023-45853 cve-2023-45853 mariner microsoft msrc msrc"},{"id":"CVE-2023-47108","cve":"CVE-2023-47108","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-47108","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-47108","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-47108","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-47108","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-47108","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2023-47108 cve-2023-47108 mariner microsoft msrc msrc"},{"id":"CVE-2023-4911","cve":"CVE-2023-4911","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4911","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4911","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4911","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4911","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4911","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2023-4911 cve-2023-4911 mariner microsoft msrc msrc"},{"id":"CVE-2023-49295","cve":"CVE-2023-49295","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-49295","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-49295","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-49295","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-49295","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-49295","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2023-49295 cve-2023-49295 mariner microsoft msrc msrc"},{"id":"CVE-2023-51257","cve":"CVE-2023-51257","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-51257","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-51257","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-51257","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-51257","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-51257","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2023-51257 cve-2023-51257 mariner microsoft msrc msrc"},{"id":"CVE-2023-5156","cve":"CVE-2023-5156","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-5156","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-5156","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-5156","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-5156","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-5156","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2023-5156 cve-2023-5156 mariner microsoft msrc msrc"},{"id":"CVE-2023-51779","cve":"CVE-2023-51779","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-51779","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-51779","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-51779","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-51779","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-51779","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2023-51779 cve-2023-51779 mariner microsoft msrc msrc"},{"id":"CVE-2023-52340","cve":"CVE-2023-52340","title":"The IPv6 implementation in the Linux kernel before 6.3 has a net/ipv6/route.c max_size threshold that can be consumed easily e.g. leading to a denial of service (network is unreach","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52340","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52340","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52340","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52340","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52340","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2023-52340 cve-2023-52340 the ipv6 implementation in the linux kernel before 6.3 has a net/ipv6/route.c max_size threshold that can be consumed easily e.g. leading to a denial of service (network is unreach microsoft msrc msrc"},{"id":"CVE-2023-52648","cve":"CVE-2023-52648","title":"drm/vmwgfx: Unmap the surface before resetting it on a plane state","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52648","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52648","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52648","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52648","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52648","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2023-52648 cve-2023-52648 drm/vmwgfx: unmap the surface before resetting it on a plane state microsoft msrc msrc"},{"id":"CVE-2023-52649","cve":"CVE-2023-52649","title":"drm/vkms: Avoid reading beyond LUT array","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52649","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52649","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52649","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52649","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52649","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2023-52649 cve-2023-52649 drm/vkms: avoid reading beyond lut array microsoft msrc msrc"},{"id":"CVE-2023-52653","cve":"CVE-2023-52653","title":"SUNRPC: fix a memleak in gss_import_v2_context","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52653","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52653","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52653","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52653","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52653","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2023-52653 cve-2023-52653 sunrpc: fix a memleak in gss_import_v2_context microsoft msrc msrc"},{"id":"CVE-2023-52656","cve":"CVE-2023-52656","title":"io_uring: drop any code related to SCM_RIGHTS","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52656","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52656","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52656","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":3.3,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52656","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52656","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2023-52656 cve-2023-52656 io_uring: drop any code related to scm_rights microsoft msrc msrc"},{"id":"CVE-2023-52660","cve":"CVE-2023-52660","title":"media: rkisp1: Fix IRQ handling due to shared interrupts","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52660","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52660","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52660","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52660","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52660","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2023-52660 cve-2023-52660 media: rkisp1: fix irq handling due to shared interrupts microsoft msrc msrc"},{"id":"CVE-2023-52670","cve":"CVE-2023-52670","title":"rpmsg: virtio: Free driver_override when rpmsg_remove()","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52670","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52670","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52670","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.6,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52670","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52670","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2023-52670 cve-2023-52670 rpmsg: virtio: free driver_override when rpmsg_remove() microsoft msrc msrc"},{"id":"CVE-2023-52671","cve":"CVE-2023-52671","title":"drm/amd/display: Fix hang/underflow when transitioning to ODM4:1","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52671","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52671","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52671","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52671","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52671","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2023-52671 cve-2023-52671 drm/amd/display: fix hang/underflow when transitioning to odm4:1 microsoft msrc msrc"},{"id":"CVE-2023-52676","cve":"CVE-2023-52676","title":"bpf: Guard stack limits against 32bit overflow","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52676","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52676","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52676","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52676","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52676","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2023-52676 cve-2023-52676 bpf: guard stack limits against 32bit overflow microsoft msrc msrc"},{"id":"CVE-2023-52682","cve":"CVE-2023-52682","title":"f2fs: fix to wait on block writeback for post_read case","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52682","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52682","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52682","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52682","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52682","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2023-52682 cve-2023-52682 f2fs: fix to wait on block writeback for post_read case microsoft msrc msrc"},{"id":"CVE-2023-52696","cve":"CVE-2023-52696","title":"powerpc/powernv: Add a null pointer check in opal_powercap_init()","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52696","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52696","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52696","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52696","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52696","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2023-52696 cve-2023-52696 powerpc/powernv: add a null pointer check in opal_powercap_init() microsoft msrc msrc"},{"id":"CVE-2023-52700","cve":"CVE-2023-52700","title":"tipc: fix kernel warning when sending SYN message","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52700","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52700","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52700","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52700","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52700","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2023-52700 cve-2023-52700 tipc: fix kernel warning when sending syn message microsoft msrc msrc"},{"id":"CVE-2023-52732","cve":"CVE-2023-52732","title":"ceph: blocklist the kclient when receiving corrupted snap trace","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52732","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52732","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52732","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52732","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52732","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2023-52732 cve-2023-52732 ceph: blocklist the kclient when receiving corrupted snap trace microsoft msrc msrc"},{"id":"CVE-2023-52733","cve":"CVE-2023-52733","title":"Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52733","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52733","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52733","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52733","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52733","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2023-52733 cve-2023-52733 rejected reason: this cve id has been rejected or withdrawn by its cve numbering authority. microsoft msrc msrc"},{"id":"CVE-2023-52737","cve":"CVE-2023-52737","title":"btrfs: lock the inode in shared mode before starting fiemap","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52737","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52737","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52737","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52737","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52737","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2023-52737 cve-2023-52737 btrfs: lock the inode in shared mode before starting fiemap microsoft msrc msrc"},{"id":"CVE-2023-52749","cve":"CVE-2023-52749","title":"spi: Fix null dereference on suspend","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52749","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52749","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52749","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.7,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52749","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52749","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2023-52749 cve-2023-52749 spi: fix null dereference on suspend microsoft msrc msrc"},{"id":"CVE-2023-52751","cve":"CVE-2023-52751","title":"smb: client: fix use-after-free in smb2_query_info_compound()","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52751","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52751","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52751","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52751","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52751","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2023-52751 cve-2023-52751 smb: client: fix use-after-free in smb2_query_info_compound() microsoft msrc msrc"},{"id":"CVE-2023-52752","cve":"CVE-2023-52752","title":"smb: client: fix use-after-free bug in cifs_debug_data_proc_show()","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52752","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52752","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52752","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52752","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52752","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2023-52752 cve-2023-52752 smb: client: fix use-after-free bug in cifs_debug_data_proc_show() microsoft msrc msrc"},{"id":"CVE-2023-52755","cve":"CVE-2023-52755","title":"ksmbd: fix slab out of bounds write in smb_inherit_dacl()","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52755","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52755","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52755","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.4,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52755","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52755","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2023-52755 cve-2023-52755 ksmbd: fix slab out of bounds write in smb_inherit_dacl() microsoft msrc msrc"},{"id":"CVE-2023-52757","cve":"CVE-2023-52757","title":"smb: client: fix potential deadlock when releasing mids","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52757","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52757","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52757","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52757","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52757","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2023-52757 cve-2023-52757 smb: client: fix potential deadlock when releasing mids microsoft msrc msrc"},{"id":"CVE-2023-52760","cve":"CVE-2023-52760","title":"gfs2: Fix slab-use-after-free in gfs2_qd_dealloc","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52760","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52760","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52760","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52760","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52760","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2023-52760 cve-2023-52760 gfs2: fix slab-use-after-free in gfs2_qd_dealloc microsoft msrc msrc"},{"id":"CVE-2023-52761","cve":"CVE-2023-52761","title":"riscv: VMAP_STACK overflow detection thread-safe","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52761","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52761","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52761","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52761","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52761","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2023-52761 cve-2023-52761 riscv: vmap_stack overflow detection thread-safe microsoft msrc msrc"},{"id":"CVE-2023-52812","cve":"CVE-2023-52812","title":"drm/amd: check num of link levels when update pcie param","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52812","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52812","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52812","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52812","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52812","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2023-52812 cve-2023-52812 drm/amd: check num of link levels when update pcie param microsoft msrc msrc"},{"id":"CVE-2023-52827","cve":"CVE-2023-52827","title":"wifi: ath12k: fix possible out-of-bound read in ath12k_htt_pull_ppdu_stats()","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52827","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52827","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52827","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52827","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52827","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2023-52827 cve-2023-52827 wifi: ath12k: fix possible out-of-bound read in ath12k_htt_pull_ppdu_stats() microsoft msrc msrc"},{"id":"CVE-2023-52831","cve":"CVE-2023-52831","title":"cpu/hotplug: Don't offline the last non-isolated CPU","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52831","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52831","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52831","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52831","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52831","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2023-52831 cve-2023-52831 cpu/hotplug: don't offline the last non-isolated cpu microsoft msrc msrc"},{"id":"CVE-2023-52888","cve":"CVE-2023-52888","title":"media: mediatek: vcodec: Only free buffer VA that is not NULL","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52888","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52888","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52888","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52888","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52888","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2023-52888 cve-2023-52888 media: mediatek: vcodec: only free buffer va that is not null microsoft msrc msrc"},{"id":"CVE-2023-5535","cve":"CVE-2023-5535","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-5535","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-5535","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-5535","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-5535","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-5535","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2023-5535 cve-2023-5535 mariner microsoft msrc msrc"},{"id":"CVE-2023-5678","cve":"CVE-2023-5678","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-5678","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-5678","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-5678","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.3,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-5678","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-5678","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2023-5678 cve-2023-5678 mariner microsoft msrc msrc"},{"id":"CVE-2023-5752","cve":"CVE-2023-5752","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-5752","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-5752","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-5752","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":3.3,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-5752","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-5752","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2023-5752 cve-2023-5752 mariner microsoft msrc msrc"},{"id":"CVE-2023-5764","cve":"CVE-2023-5764","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-5764","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-5764","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-5764","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-5764","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-5764","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2023-5764 cve-2023-5764 mariner microsoft msrc msrc"},{"id":"CVE-2023-6337","cve":"CVE-2023-6337","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-6337","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-6337","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-6337","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-6337","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-6337","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2023-6337 cve-2023-6337 mariner microsoft msrc msrc"},{"id":"CVE-2023-6507","cve":"CVE-2023-6507","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-6507","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-6507","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-6507","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.9,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-6507","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-6507","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2023-6507 cve-2023-6507 mariner microsoft msrc msrc"},{"id":"CVE-2023-6597","cve":"CVE-2023-6597","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-6597","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-6597","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-6597","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-6597","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-6597","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2023-6597 cve-2023-6597 mariner microsoft msrc msrc"},{"id":"CVE-2024-0229","cve":"CVE-2024-0229","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0229","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0229","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0229","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0229","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0229","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-0229 cve-2024-0229 mariner microsoft msrc msrc"},{"id":"CVE-2024-0397","cve":"CVE-2024-0397","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0397","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0397","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0397","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.4,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0397","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0397","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-0397 cve-2024-0397 mariner microsoft msrc msrc"},{"id":"CVE-2024-0409","cve":"CVE-2024-0409","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0409","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0409","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0409","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0409","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0409","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-0409 cve-2024-0409 mariner microsoft msrc msrc"},{"id":"CVE-2024-0450","cve":"CVE-2024-0450","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0450","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0450","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0450","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.2,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0450","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0450","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-0450 cve-2024-0450 mariner microsoft msrc msrc"},{"id":"CVE-2024-0684","cve":"CVE-2024-0684","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0684","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0684","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0684","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0684","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0684","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-0684 cve-2024-0684 mariner microsoft msrc msrc"},{"id":"CVE-2024-0727","cve":"CVE-2024-0727","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0727","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0727","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0727","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0727","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0727","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-0727 cve-2024-0727 mariner microsoft msrc msrc"},{"id":"CVE-2024-0760","cve":"CVE-2024-0760","title":"A flood of DNS messages over TCP may make the server unstable","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0760","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0760","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0760","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0760","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0760","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-0760 cve-2024-0760 a flood of dns messages over tcp may make the server unstable microsoft msrc msrc"},{"id":"CVE-2024-0853","cve":"CVE-2024-0853","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0853","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0853","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0853","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.3,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0853","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0853","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-0853 cve-2024-0853 mariner microsoft msrc msrc"},{"id":"CVE-2024-0874","cve":"CVE-2024-0874","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0874","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0874","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0874","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.3,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0874","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0874","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-0874 cve-2024-0874 mariner microsoft msrc msrc"},{"id":"CVE-2024-12084","cve":"CVE-2024-12084","title":"Rsync: heap buffer overflow in rsync due to improper checksum length handling","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-12084","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-12084","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-12084","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-12084","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-12084","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2024-12084 cve-2024-12084 rsync: heap buffer overflow in rsync due to improper checksum length handling microsoft msrc msrc"},{"id":"CVE-2024-12085","cve":"CVE-2024-12085","title":"Rsync: info leak via uninitialized stack contents","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-12085","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-12085","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-12085","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-12085","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-12085","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-12085 cve-2024-12085 rsync: info leak via uninitialized stack contents microsoft msrc msrc"},{"id":"CVE-2024-12747","cve":"CVE-2024-12747","title":"Rsync: race condition in rsync handling symbolic links","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-12747","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-12747","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-12747","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.6,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-12747","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-12747","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-12747 cve-2024-12747 rsync: race condition in rsync handling symbolic links microsoft msrc msrc"},{"id":"CVE-2024-1298","cve":"CVE-2024-1298","title":"Integer Overflow caused by divide by zero during S3 suspension","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-1298","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-1298","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-1298","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-1298","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-1298","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-1298 cve-2024-1298 integer overflow caused by divide by zero during s3 suspension microsoft msrc msrc"},{"id":"CVE-2024-1737","cve":"CVE-2024-1737","title":"BIND's database will be slow if a very large number of RRs exist at the same name","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-1737","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-1737","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-1737","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-1737","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-1737","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-1737 cve-2024-1737 bind's database will be slow if a very large number of rrs exist at the same name microsoft msrc msrc"},{"id":"CVE-2024-1753","cve":"CVE-2024-1753","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-1753","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-1753","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-1753","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.6,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-1753","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-1753","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-1753 cve-2024-1753 mariner microsoft msrc msrc"},{"id":"CVE-2024-1929","cve":"CVE-2024-1929","title":"Local Root Exploit via Configuration Dictionary","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-1929","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-1929","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-1929","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-1929","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-1929","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-1929 cve-2024-1929 local root exploit via configuration dictionary microsoft msrc msrc"},{"id":"CVE-2024-1930","cve":"CVE-2024-1930","title":"No Limit on Number of Open Sessions / Bad Session Close Behaviour","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-1930","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-1930","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-1930","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-1930","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-1930","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-1930 cve-2024-1930 no limit on number of open sessions / bad session close behaviour microsoft msrc msrc"},{"id":"CVE-2024-1975","cve":"CVE-2024-1975","title":"SIG(0) can be used to exhaust CPU resources","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-1975","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-1975","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-1975","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-1975","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-1975","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-1975 cve-2024-1975 sig(0) can be used to exhaust cpu resources microsoft msrc msrc"},{"id":"CVE-2024-20701","cve":"CVE-2024-20701","title":"SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20701","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20701","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20701","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20701","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20701","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-20701 cve-2024-20701 sql server native client ole db provider remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-20961","cve":"CVE-2024-20961","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20961","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20961","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20961","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20961","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20961","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-20961 cve-2024-20961 mariner microsoft msrc msrc"},{"id":"CVE-2024-20963","cve":"CVE-2024-20963","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20963","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20963","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20963","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20963","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20963","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-20963 cve-2024-20963 mariner microsoft msrc msrc"},{"id":"CVE-2024-20965","cve":"CVE-2024-20965","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20965","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20965","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20965","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.9,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20965","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20965","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-20965 cve-2024-20965 mariner microsoft msrc msrc"},{"id":"CVE-2024-20967","cve":"CVE-2024-20967","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20967","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20967","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20967","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20967","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20967","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-20967 cve-2024-20967 mariner microsoft msrc msrc"},{"id":"CVE-2024-20969","cve":"CVE-2024-20969","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20969","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20969","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20969","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20969","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20969","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-20969 cve-2024-20969 mariner microsoft msrc msrc"},{"id":"CVE-2024-20971","cve":"CVE-2024-20971","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20971","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20971","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20971","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.9,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20971","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20971","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-20971 cve-2024-20971 mariner microsoft msrc msrc"},{"id":"CVE-2024-20973","cve":"CVE-2024-20973","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20973","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20973","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20973","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20973","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20973","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-20973 cve-2024-20973 mariner microsoft msrc msrc"},{"id":"CVE-2024-20977","cve":"CVE-2024-20977","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20977","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20977","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20977","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20977","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20977","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-20977 cve-2024-20977 mariner microsoft msrc msrc"},{"id":"CVE-2024-20981","cve":"CVE-2024-20981","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20981","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20981","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20981","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.9,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20981","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20981","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-20981 cve-2024-20981 mariner microsoft msrc msrc"},{"id":"CVE-2024-20985","cve":"CVE-2024-20985","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20985","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20985","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20985","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20985","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20985","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-20985 cve-2024-20985 mariner microsoft msrc msrc"},{"id":"CVE-2024-20996","cve":"CVE-2024-20996","title":"Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. Easily exploitable vul","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20996","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20996","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20996","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.9,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20996","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20996","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-20996 cve-2024-20996 vulnerability in the mysql server product of oracle mysql (component: innodb). supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. easily exploitable vul microsoft msrc msrc"},{"id":"CVE-2024-21125","cve":"CVE-2024-21125","title":"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. Easily exploitabl","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21125","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21125","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21125","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.9,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21125","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21125","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-21125 cve-2024-21125 vulnerability in the mysql server product of oracle mysql (component: server: fts). supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. easily exploitabl microsoft msrc msrc"},{"id":"CVE-2024-21127","cve":"CVE-2024-21127","title":"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. Easily exploitabl","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21127","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21127","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21127","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.9,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21127","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21127","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-21127 cve-2024-21127 vulnerability in the mysql server product of oracle mysql (component: server: ddl). supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. easily exploitabl microsoft msrc msrc"},{"id":"CVE-2024-21129","cve":"CVE-2024-21129","title":"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. Easily exploitabl","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21129","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21129","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21129","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.9,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21129","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21129","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-21129 cve-2024-21129 vulnerability in the mysql server product of oracle mysql (component: server: ddl). supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. easily exploitabl microsoft msrc msrc"},{"id":"CVE-2024-21130","cve":"CVE-2024-21130","title":"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. Easily expl","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21130","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21130","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21130","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.9,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21130","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21130","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-21130 cve-2024-21130 vulnerability in the mysql server product of oracle mysql (component: server: optimizer). supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. easily expl microsoft msrc msrc"},{"id":"CVE-2024-21134","cve":"CVE-2024-21134","title":"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Connection Handling). Supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. E","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21134","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21134","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21134","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.3,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21134","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21134","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-21134 cve-2024-21134 vulnerability in the mysql server product of oracle mysql (component: server: connection handling). supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. e microsoft msrc msrc"},{"id":"CVE-2024-21135","cve":"CVE-2024-21135","title":"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.36 and prior and 8.3.0 and prior. Easily expl","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21135","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21135","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21135","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.9,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21135","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21135","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-21135 cve-2024-21135 vulnerability in the mysql server product of oracle mysql (component: server: optimizer). supported versions that are affected are 8.0.36 and prior and 8.3.0 and prior. easily expl microsoft msrc msrc"},{"id":"CVE-2024-21142","cve":"CVE-2024-21142","title":"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior.","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21142","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21142","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21142","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.9,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21142","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21142","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-21142 cve-2024-21142 vulnerability in the mysql server product of oracle mysql (component: server: security: privileges). supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. microsoft msrc msrc"},{"id":"CVE-2024-21157","cve":"CVE-2024-21157","title":"Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.36 and prior and 8.4.0 and prior. Easily exploitable vul","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21157","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21157","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21157","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.9,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21157","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21157","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-21157 cve-2024-21157 vulnerability in the mysql server product of oracle mysql (component: innodb). supported versions that are affected are 8.0.36 and prior and 8.4.0 and prior. easily exploitable vul microsoft msrc msrc"},{"id":"CVE-2024-21159","cve":"CVE-2024-21159","title":"Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.36 and prior and 8.3.0 and prior. Easily exploitable vul","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21159","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21159","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21159","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.9,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21159","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21159","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-21159 cve-2024-21159 vulnerability in the mysql server product of oracle mysql (component: innodb). supported versions that are affected are 8.0.36 and prior and 8.3.0 and prior. easily exploitable vul microsoft msrc msrc"},{"id":"CVE-2024-21160","cve":"CVE-2024-21160","title":"Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.36 and prior and 8.3.0 and prior. Easily exploitable vul","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21160","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21160","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21160","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.9,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21160","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21160","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-21160 cve-2024-21160 vulnerability in the mysql server product of oracle mysql (component: innodb). supported versions that are affected are 8.0.36 and prior and 8.3.0 and prior. easily exploitable vul microsoft msrc msrc"},{"id":"CVE-2024-21162","cve":"CVE-2024-21162","title":"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. Easily expl","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21162","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21162","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21162","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.9,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21162","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21162","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-21162 cve-2024-21162 vulnerability in the mysql server product of oracle mysql (component: server: optimizer). supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. easily expl microsoft msrc msrc"},{"id":"CVE-2024-21163","cve":"CVE-2024-21163","title":"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. Easily expl","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21163","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21163","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21163","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21163","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21163","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-21163 cve-2024-21163 vulnerability in the mysql server product of oracle mysql (component: server: optimizer). supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. easily expl microsoft msrc msrc"},{"id":"CVE-2024-21165","cve":"CVE-2024-21165","title":"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Pluggable Auth). Supported versions that are affected are 8.0.37 and prior. Easily exploitable vulnera","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21165","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21165","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21165","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.9,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21165","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21165","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-21165 cve-2024-21165 vulnerability in the mysql server product of oracle mysql (component: server: pluggable auth). supported versions that are affected are 8.0.37 and prior. easily exploitable vulnera microsoft msrc msrc"},{"id":"CVE-2024-21166","cve":"CVE-2024-21166","title":"Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.36 and prior and 8.3.0 and prior. Difficult to exploit v","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21166","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21166","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21166","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.9,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21166","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21166","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-21166 cve-2024-21166 vulnerability in the mysql server product of oracle mysql (component: innodb). supported versions that are affected are 8.0.36 and prior and 8.3.0 and prior. difficult to exploit v microsoft msrc msrc"},{"id":"CVE-2024-21171","cve":"CVE-2024-21171","title":"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. Easily expl","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21171","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21171","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21171","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21171","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21171","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-21171 cve-2024-21171 vulnerability in the mysql server product of oracle mysql (component: server: optimizer). supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. easily expl microsoft msrc msrc"},{"id":"CVE-2024-21173","cve":"CVE-2024-21173","title":"Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. Easily exploitable vul","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21173","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21173","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21173","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.9,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21173","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21173","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-21173 cve-2024-21173 vulnerability in the mysql server product of oracle mysql (component: innodb). supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. easily exploitable vul microsoft msrc msrc"},{"id":"CVE-2024-21176","cve":"CVE-2024-21176","title":"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Thread Pooling). Supported versions that are affected are 8.4.0 and prior. Difficult to exploit vulner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21176","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21176","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21176","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.3,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21176","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21176","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-21176 cve-2024-21176 vulnerability in the mysql server product of oracle mysql (component: server: thread pooling). supported versions that are affected are 8.4.0 and prior. difficult to exploit vulner microsoft msrc msrc"},{"id":"CVE-2024-21303","cve":"CVE-2024-21303","title":"SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21303","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21303","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21303","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21303","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21303","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-21303 cve-2024-21303 sql server native client ole db provider remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-21308","cve":"CVE-2024-21308","title":"SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21308","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21308","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21308","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21308","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21308","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-21308 cve-2024-21308 sql server native client ole db provider remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-21317","cve":"CVE-2024-21317","title":"SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21317","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21317","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21317","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21317","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21317","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-21317 cve-2024-21317 sql server native client ole db provider remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-21331","cve":"CVE-2024-21331","title":"SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21331","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21331","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21331","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21331","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21331","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-21331 cve-2024-21331 sql server native client ole db provider remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-21332","cve":"CVE-2024-21332","title":"SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21332","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21332","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21332","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21332","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21332","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-21332 cve-2024-21332 sql server native client ole db provider remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-21333","cve":"CVE-2024-21333","title":"SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21333","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21333","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21333","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21333","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21333","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-21333 cve-2024-21333 sql server native client ole db provider remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-21335","cve":"CVE-2024-21335","title":"SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21335","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21335","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21335","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21335","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21335","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-21335 cve-2024-21335 sql server native client ole db provider remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-21373","cve":"CVE-2024-21373","title":"SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21373","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21373","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21373","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21373","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21373","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-21373 cve-2024-21373 sql server native client ole db provider remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-21398","cve":"CVE-2024-21398","title":"SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21398","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21398","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21398","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21398","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21398","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-21398 cve-2024-21398 sql server native client ole db provider remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-21414","cve":"CVE-2024-21414","title":"SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21414","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21414","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21414","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21414","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21414","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-21414 cve-2024-21414 sql server native client ole db provider remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-21415","cve":"CVE-2024-21415","title":"SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21415","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21415","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21415","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21415","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21415","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-21415 cve-2024-21415 sql server native client ole db provider remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-21416","cve":"CVE-2024-21416","title":"Windows TCP/IP Remote Code Execution Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21416","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21416","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21416","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.1,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21416","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21416","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-21416 cve-2024-21416 windows tcp/ip remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-21417","cve":"CVE-2024-21417","title":"Windows Text Services Framework Elevation of Privilege Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21417","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21417","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21417","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21417","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21417","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-21417 cve-2024-21417 windows text services framework elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-21425","cve":"CVE-2024-21425","title":"SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21425","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21425","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21425","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21425","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21425","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-21425 cve-2024-21425 sql server native client ole db provider remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-21428","cve":"CVE-2024-21428","title":"SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21428","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21428","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21428","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21428","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21428","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-21428 cve-2024-21428 sql server native client ole db provider remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-21449","cve":"CVE-2024-21449","title":"SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21449","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21449","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21449","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21449","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21449","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-21449 cve-2024-21449 sql server native client ole db provider remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-21886","cve":"CVE-2024-21886","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21886","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21886","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21886","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21886","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21886","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-21886 cve-2024-21886 mariner microsoft msrc msrc"},{"id":"CVE-2024-22189","cve":"CVE-2024-22189","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-22189","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-22189","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-22189","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-22189","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-22189","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-22189 cve-2024-22189 mariner microsoft msrc msrc"},{"id":"CVE-2024-2410","cve":"CVE-2024-2410","title":"Use after free in C++ protobuf","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-2410","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-2410","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-2410","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.6,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-2410","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-2410","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-2410 cve-2024-2410 use after free in c++ protobuf microsoft msrc msrc"},{"id":"CVE-2024-24474","cve":"CVE-2024-24474","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-24474","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-24474","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-24474","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-24474","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-24474","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-24474 cve-2024-24474 mariner microsoft msrc msrc"},{"id":"CVE-2024-24787","cve":"CVE-2024-24787","title":"Arbitrary code execution during build on Darwin in cmd/go","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-24787","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-24787","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-24787","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.4,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-24787","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-24787","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-24787 cve-2024-24787 arbitrary code execution during build on darwin in cmd/go microsoft msrc msrc"},{"id":"CVE-2024-24788","cve":"CVE-2024-24788","title":"Malformed DNS message can cause infinite loop in net","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-24788","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-24788","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-24788","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.9,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-24788","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-24788","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-24788 cve-2024-24788 malformed dns message can cause infinite loop in net microsoft msrc msrc"},{"id":"CVE-2024-24791","cve":"CVE-2024-24791","title":"Denial of service due to improper 100-continue handling in net/http","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-24791","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-24791","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-24791","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-24791","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-24791","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-24791 cve-2024-24791 denial of service due to improper 100-continue handling in net/http microsoft msrc msrc"},{"id":"CVE-2024-25062","cve":"CVE-2024-25062","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-25062","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-25062","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-25062","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-25062","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-25062","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-25062 cve-2024-25062 mariner microsoft msrc msrc"},{"id":"CVE-2024-26147","cve":"CVE-2024-26147","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26147","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26147","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26147","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26147","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26147","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-26147 cve-2024-26147 mariner microsoft msrc msrc"},{"id":"CVE-2024-26184","cve":"CVE-2024-26184","title":"Secure Boot Security Feature Bypass Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26184","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26184","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26184","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26184","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26184","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-26184 cve-2024-26184 secure boot security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2024-26186","cve":"CVE-2024-26186","title":"Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26186","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26186","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26186","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26186","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26186","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-26186 cve-2024-26186 microsoft sql server native scoring remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-26191","cve":"CVE-2024-26191","title":"Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26191","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26191","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26191","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26191","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26191","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-26191 cve-2024-26191 microsoft sql server native scoring remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-26238","cve":"CVE-2024-26238","title":"Microsoft PLUGScheduler Scheduled Task Elevation of Privilege Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26238","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26238","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26238","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26238","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26238","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-26238 cve-2024-26238 microsoft plugscheduler scheduled task elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-26306","cve":"CVE-2024-26306","title":"iPerf3 before 3.17 when used with OpenSSL before 3.2.0 as a server with RSA authentication allows a timing side channel in RSA decryption operations. This side channel could be suf","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26306","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26306","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26306","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.9,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26306","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26306","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-26306 cve-2024-26306 iperf3 before 3.17 when used with openssl before 3.2.0 as a server with rsa authentication allows a timing side channel in rsa decryption operations. this side channel could be suf microsoft msrc msrc"},{"id":"CVE-2024-26461","cve":"CVE-2024-26461","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26461","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26461","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26461","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26461","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26461","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-26461 cve-2024-26461 mariner microsoft msrc msrc"},{"id":"CVE-2024-26929","cve":"CVE-2024-26929","title":"Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26929","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26929","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26929","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26929","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26929","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-26929 cve-2024-26929 rejected reason: this cve id has been rejected or withdrawn by its cve numbering authority. microsoft msrc msrc"},{"id":"CVE-2024-26930","cve":"CVE-2024-26930","title":"scsi: qla2xxx: Fix double free of the ha-&gt;vp_map pointer","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26930","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26930","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26930","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26930","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26930","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-26930 cve-2024-26930 scsi: qla2xxx: fix double free of the ha-&gt;vp_map pointer microsoft msrc msrc"},{"id":"CVE-2024-26933","cve":"CVE-2024-26933","title":"USB: core: Fix deadlock in port \"disable\" sysfs attribute","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26933","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26933","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26933","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26933","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26933","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-26933 cve-2024-26933 usb: core: fix deadlock in port \"disable\" sysfs attribute microsoft msrc msrc"},{"id":"CVE-2024-26934","cve":"CVE-2024-26934","title":"USB: core: Fix deadlock in usb_deauthorize_interface()","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26934","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26934","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26934","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26934","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26934","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-26934 cve-2024-26934 usb: core: fix deadlock in usb_deauthorize_interface() microsoft msrc msrc"},{"id":"CVE-2024-26938","cve":"CVE-2024-26938","title":"drm/i915/bios: Tolerate devdata==NULL in intel_bios_encoder_supports_dp_dual_mode()","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26938","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26938","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26938","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26938","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26938","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-26938 cve-2024-26938 drm/i915/bios: tolerate devdata==null in intel_bios_encoder_supports_dp_dual_mode() microsoft msrc msrc"},{"id":"CVE-2024-26940","cve":"CVE-2024-26940","title":"drm/vmwgfx: Create debugfs ttm_resource_manager entry only if needed","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26940","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26940","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26940","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26940","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26940","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-26940 cve-2024-26940 drm/vmwgfx: create debugfs ttm_resource_manager entry only if needed microsoft msrc msrc"},{"id":"CVE-2024-26943","cve":"CVE-2024-26943","title":"nouveau/dmem: handle kcalloc() allocation failure","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26943","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26943","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26943","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26943","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26943","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-26943 cve-2024-26943 nouveau/dmem: handle kcalloc() allocation failure microsoft msrc msrc"},{"id":"CVE-2024-26945","cve":"CVE-2024-26945","title":"crypto: iaa - Fix nr_cpus &lt; nr_iaa case","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26945","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26945","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26945","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.4,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26945","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26945","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-26945 cve-2024-26945 crypto: iaa - fix nr_cpus &lt; nr_iaa case microsoft msrc msrc"},{"id":"CVE-2024-26947","cve":"CVE-2024-26947","title":"ARM: 9359/1: flush: check if the folio is reserved for no-mapping addresses","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26947","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26947","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26947","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26947","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26947","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-26947 cve-2024-26947 arm: 9359/1: flush: check if the folio is reserved for no-mapping addresses microsoft msrc msrc"},{"id":"CVE-2024-26948","cve":"CVE-2024-26948","title":"drm/amd/display: Add a dc_state NULL check in dc_state_release","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26948","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26948","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26948","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26948","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26948","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-26948 cve-2024-26948 drm/amd/display: add a dc_state null check in dc_state_release microsoft msrc msrc"},{"id":"CVE-2024-26949","cve":"CVE-2024-26949","title":"drm/amdgpu/pm: Fix NULL pointer dereference when get power limit","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26949","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26949","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26949","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26949","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26949","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-26949 cve-2024-26949 drm/amdgpu/pm: fix null pointer dereference when get power limit microsoft msrc msrc"},{"id":"CVE-2024-26950","cve":"CVE-2024-26950","title":"wireguard: netlink: access device through ctx instead of peer","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26950","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26950","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26950","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26950","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26950","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-26950 cve-2024-26950 wireguard: netlink: access device through ctx instead of peer microsoft msrc msrc"},{"id":"CVE-2024-26952","cve":"CVE-2024-26952","title":"ksmbd: fix potencial out-of-bounds when buffer offset is invalid","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26952","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26952","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26952","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26952","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26952","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-26952 cve-2024-26952 ksmbd: fix potencial out-of-bounds when buffer offset is invalid microsoft msrc msrc"},{"id":"CVE-2024-26953","cve":"CVE-2024-26953","title":"net: esp: fix bad handling of pages from page_pool","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26953","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26953","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26953","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26953","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26953","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-26953 cve-2024-26953 net: esp: fix bad handling of pages from page_pool microsoft msrc msrc"},{"id":"CVE-2024-26961","cve":"CVE-2024-26961","title":"mac802154: fix llsec key resources release in mac802154_llsec_key_del","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26961","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26961","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26961","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26961","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26961","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-26961 cve-2024-26961 mac802154: fix llsec key resources release in mac802154_llsec_key_del microsoft msrc msrc"},{"id":"CVE-2024-26969","cve":"CVE-2024-26969","title":"clk: qcom: gcc-ipq8074: fix terminating of frequency table arrays","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26969","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26969","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26969","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26969","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26969","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-26969 cve-2024-26969 clk: qcom: gcc-ipq8074: fix terminating of frequency table arrays microsoft msrc msrc"},{"id":"CVE-2024-26977","cve":"CVE-2024-26977","title":"pci_iounmap(): Fix MMIO mapping leak","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26977","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26977","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26977","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26977","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26977","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-26977 cve-2024-26977 pci_iounmap(): fix mmio mapping leak microsoft msrc msrc"},{"id":"CVE-2024-26978","cve":"CVE-2024-26978","title":"serial: max310x: fix NULL pointer dereference in I2C instantiation","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26978","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26978","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26978","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26978","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26978","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-26978 cve-2024-26978 serial: max310x: fix null pointer dereference in i2c instantiation microsoft msrc msrc"},{"id":"CVE-2024-26982","cve":"CVE-2024-26982","title":"Squashfs: check the inode number is not the invalid value of zero","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26982","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26982","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26982","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26982","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26982","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-26982 cve-2024-26982 squashfs: check the inode number is not the invalid value of zero microsoft msrc msrc"},{"id":"CVE-2024-26983","cve":"CVE-2024-26983","title":"bootconfig: use memblock_free_late to free xbc memory to buddy","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26983","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26983","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26983","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26983","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26983","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-26983 cve-2024-26983 bootconfig: use memblock_free_late to free xbc memory to buddy microsoft msrc msrc"},{"id":"CVE-2024-26984","cve":"CVE-2024-26984","title":"nouveau: fix instmem race condition around ptr stores","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26984","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26984","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26984","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26984","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26984","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-26984 cve-2024-26984 nouveau: fix instmem race condition around ptr stores microsoft msrc msrc"},{"id":"CVE-2024-26986","cve":"CVE-2024-26986","title":"drm/amdkfd: Fix memory leak in create_process failure","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26986","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26986","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26986","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26986","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26986","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-26986 cve-2024-26986 drm/amdkfd: fix memory leak in create_process failure microsoft msrc msrc"},{"id":"CVE-2024-26987","cve":"CVE-2024-26987","title":"mm/memory-failure: fix deadlock when hugetlb_optimize_vmemmap is enabled","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26987","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26987","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26987","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26987","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26987","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-26987 cve-2024-26987 mm/memory-failure: fix deadlock when hugetlb_optimize_vmemmap is enabled microsoft msrc msrc"},{"id":"CVE-2024-26990","cve":"CVE-2024-26990","title":"KVM: x86/mmu: Write-protect L2 SPTEs in TDP MMU when clearing dirty status","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26990","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26990","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26990","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26990","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26990","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-26990 cve-2024-26990 kvm: x86/mmu: write-protect l2 sptes in tdp mmu when clearing dirty status microsoft msrc msrc"},{"id":"CVE-2024-27002","cve":"CVE-2024-27002","title":"clk: mediatek: Do a runtime PM get on controllers during probe","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27002","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27002","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27002","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27002","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27002","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-27002 cve-2024-27002 clk: mediatek: do a runtime pm get on controllers during probe microsoft msrc msrc"},{"id":"CVE-2024-27005","cve":"CVE-2024-27005","title":"interconnect: Don't access req_list while it's being manipulated","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27005","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27005","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27005","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.3,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27005","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27005","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-27005 cve-2024-27005 interconnect: don't access req_list while it's being manipulated microsoft msrc msrc"},{"id":"CVE-2024-27012","cve":"CVE-2024-27012","title":"netfilter: nf_tables: restore set elements when delete set fails","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27012","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27012","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27012","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27012","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27012","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-27012 cve-2024-27012 netfilter: nf_tables: restore set elements when delete set fails microsoft msrc msrc"},{"id":"CVE-2024-27013","cve":"CVE-2024-27013","title":"tun: limit printing rate when illegal packet received by tun dev","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27013","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27013","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27013","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27013","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27013","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-27013 cve-2024-27013 tun: limit printing rate when illegal packet received by tun dev microsoft msrc msrc"},{"id":"CVE-2024-27014","cve":"CVE-2024-27014","title":"net/mlx5e: Prevent deadlock while disabling aRFS","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27014","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27014","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27014","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27014","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27014","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-27014 cve-2024-27014 net/mlx5e: prevent deadlock while disabling arfs microsoft msrc msrc"},{"id":"CVE-2024-27015","cve":"CVE-2024-27015","title":"netfilter: flowtable: incorrect pppoe tuple","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27015","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27015","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27015","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27015","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27015","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-27015 cve-2024-27015 netfilter: flowtable: incorrect pppoe tuple microsoft msrc msrc"},{"id":"CVE-2024-27016","cve":"CVE-2024-27016","title":"netfilter: flowtable: validate pppoe header","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27016","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27016","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27016","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27016","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27016","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-27016 cve-2024-27016 netfilter: flowtable: validate pppoe header microsoft msrc msrc"},{"id":"CVE-2024-27017","cve":"CVE-2024-27017","title":"netfilter: nft_set_pipapo: walk over current view on netlink dump","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27017","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27017","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27017","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27017","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27017","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-27017 cve-2024-27017 netfilter: nft_set_pipapo: walk over current view on netlink dump microsoft msrc msrc"},{"id":"CVE-2024-27018","cve":"CVE-2024-27018","title":"netfilter: br_netfilter: skip conntrack input hook for promisc packets","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27018","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27018","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27018","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27018","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27018","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-27018 cve-2024-27018 netfilter: br_netfilter: skip conntrack input hook for promisc packets microsoft msrc msrc"},{"id":"CVE-2024-27019","cve":"CVE-2024-27019","title":"netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get()","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27019","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27019","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27019","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.7,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27019","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27019","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-27019 cve-2024-27019 netfilter: nf_tables: fix potential data-race in __nft_obj_type_get() microsoft msrc msrc"},{"id":"CVE-2024-27020","cve":"CVE-2024-27020","title":"netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get()","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27020","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27020","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27020","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27020","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27020","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-27020 cve-2024-27020 netfilter: nf_tables: fix potential data-race in __nft_expr_type_get() microsoft msrc msrc"},{"id":"CVE-2024-27022","cve":"CVE-2024-27022","title":"fork: defer linking file vma until vma is fully initialized","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27022","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27022","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27022","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27022","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27022","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-27022 cve-2024-27022 fork: defer linking file vma until vma is fully initialized microsoft msrc msrc"},{"id":"CVE-2024-27028","cve":"CVE-2024-27028","title":"spi: spi-mt65xx: Fix NULL pointer access in interrupt handler","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27028","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27028","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27028","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27028","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27028","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-27028 cve-2024-27028 spi: spi-mt65xx: fix null pointer access in interrupt handler microsoft msrc msrc"},{"id":"CVE-2024-27032","cve":"CVE-2024-27032","title":"f2fs: fix to avoid potential panic during recovery","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27032","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27032","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27032","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.3,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27032","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27032","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-27032 cve-2024-27032 f2fs: fix to avoid potential panic during recovery microsoft msrc msrc"},{"id":"CVE-2024-27035","cve":"CVE-2024-27035","title":"f2fs: compress: fix to guarantee persisting compressed blocks by CP","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27035","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27035","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27035","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27035","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27035","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-27035 cve-2024-27035 f2fs: compress: fix to guarantee persisting compressed blocks by cp microsoft msrc msrc"},{"id":"CVE-2024-27037","cve":"CVE-2024-27037","title":"clk: zynq: Prevent null pointer dereference caused by kmalloc failure","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27037","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27037","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27037","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27037","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27037","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-27037 cve-2024-27037 clk: zynq: prevent null pointer dereference caused by kmalloc failure microsoft msrc msrc"},{"id":"CVE-2024-27038","cve":"CVE-2024-27038","title":"clk: Fix clk_core_get NULL dereference","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27038","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27038","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27038","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27038","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27038","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-27038 cve-2024-27038 clk: fix clk_core_get null dereference microsoft msrc msrc"},{"id":"CVE-2024-27041","cve":"CVE-2024-27041","title":"drm/amd/display: fix NULL checks for adev-&gt;dm.dc in amdgpu_dm_fini()","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27041","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27041","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27041","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27041","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27041","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-27041 cve-2024-27041 drm/amd/display: fix null checks for adev-&gt;dm.dc in amdgpu_dm_fini() microsoft msrc msrc"},{"id":"CVE-2024-27050","cve":"CVE-2024-27050","title":"libbpf: Use OPTS_SET() macro in bpf_xdp_query()","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27050","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27050","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27050","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27050","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27050","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-27050 cve-2024-27050 libbpf: use opts_set() macro in bpf_xdp_query() microsoft msrc msrc"},{"id":"CVE-2024-27053","cve":"CVE-2024-27053","title":"wifi: wilc1000: fix RCU usage in connect path","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27053","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27053","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27053","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.1,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27053","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27053","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2024-27053 cve-2024-27053 wifi: wilc1000: fix rcu usage in connect path microsoft msrc msrc"},{"id":"CVE-2024-27056","cve":"CVE-2024-27056","title":"wifi: iwlwifi: mvm: ensure offloading TID queue exists","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27056","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27056","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27056","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27056","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27056","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-27056 cve-2024-27056 wifi: iwlwifi: mvm: ensure offloading tid queue exists microsoft msrc msrc"},{"id":"CVE-2024-27058","cve":"CVE-2024-27058","title":"tmpfs: fix race on handling dquot rbtree","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27058","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27058","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27058","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.7,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27058","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27058","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-27058 cve-2024-27058 tmpfs: fix race on handling dquot rbtree microsoft msrc msrc"},{"id":"CVE-2024-27059","cve":"CVE-2024-27059","title":"USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27059","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27059","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27059","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27059","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27059","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-27059 cve-2024-27059 usb: usb-storage: prevent divide-by-0 error in isd200_ata_command microsoft msrc msrc"},{"id":"CVE-2024-27061","cve":"CVE-2024-27061","title":"crypto: sun8i-ce - Fix use after free in unprepare","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27061","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27061","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27061","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27061","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27061","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-27061 cve-2024-27061 crypto: sun8i-ce - fix use after free in unprepare microsoft msrc msrc"},{"id":"CVE-2024-27062","cve":"CVE-2024-27062","title":"nouveau: lock the client object tree.","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27062","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27062","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27062","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27062","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27062","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-27062 cve-2024-27062 nouveau: lock the client object tree. microsoft msrc msrc"},{"id":"CVE-2024-27063","cve":"CVE-2024-27063","title":"leds: trigger: netdev: Fix kernel panic on interface rename trig notify","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27063","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27063","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27063","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27063","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27063","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-27063 cve-2024-27063 leds: trigger: netdev: fix kernel panic on interface rename trig notify microsoft msrc msrc"},{"id":"CVE-2024-27066","cve":"CVE-2024-27066","title":"virtio: packed: fix unmap leak for indirect desc table","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27066","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27066","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27066","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27066","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27066","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-27066 cve-2024-27066 virtio: packed: fix unmap leak for indirect desc table microsoft msrc msrc"},{"id":"CVE-2024-27076","cve":"CVE-2024-27076","title":"media: imx: csc/scaler: fix v4l2_ctrl_handler memory leak","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27076","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27076","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27076","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27076","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27076","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-27076 cve-2024-27076 media: imx: csc/scaler: fix v4l2_ctrl_handler memory leak microsoft msrc msrc"},{"id":"CVE-2024-27281","cve":"CVE-2024-27281","title":"An issue was discovered in RDoc 6.3.3 through 6.6.2 as distributed in Ruby 3.x through 3.3.0. When parsing .rdoc_options (used for configuration in RDoc) as a YAML file object inje","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27281","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27281","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27281","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27281","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27281","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-27281 cve-2024-27281 an issue was discovered in rdoc 6.3.3 through 6.6.2 as distributed in ruby 3.x through 3.3.0. when parsing .rdoc_options (used for configuration in rdoc) as a yaml file object inje microsoft msrc msrc"},{"id":"CVE-2024-27282","cve":"CVE-2024-27282","title":"An issue was discovered in Ruby 3.x through 3.3.0. If attacker-supplied data is provided to the Ruby regex compiler it is possible to extract arbitrary heap data relative to the st","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27282","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27282","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27282","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.6,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27282","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27282","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-27282 cve-2024-27282 an issue was discovered in ruby 3.x through 3.3.0. if attacker-supplied data is provided to the ruby regex compiler it is possible to extract arbitrary heap data relative to the st microsoft msrc msrc"},{"id":"CVE-2024-27318","cve":"CVE-2024-27318","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27318","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27318","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27318","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27318","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27318","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-27318 cve-2024-27318 mariner microsoft msrc msrc"},{"id":"CVE-2024-27322","cve":"CVE-2024-27322","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27322","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27322","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27322","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27322","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27322","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-27322 cve-2024-27322 mariner microsoft msrc msrc"},{"id":"CVE-2024-27388","cve":"CVE-2024-27388","title":"SUNRPC: fix some memleaks in gssx_dec_option_array","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27388","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27388","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27388","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27388","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27388","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-27388 cve-2024-27388 sunrpc: fix some memleaks in gssx_dec_option_array microsoft msrc msrc"},{"id":"CVE-2024-27389","cve":"CVE-2024-27389","title":"pstore: inode: Only d_invalidate() is needed","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27389","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27389","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27389","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27389","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27389","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-27389 cve-2024-27389 pstore: inode: only d_invalidate() is needed microsoft msrc msrc"},{"id":"CVE-2024-27393","cve":"CVE-2024-27393","title":"xen-netfront: Add missing skb_mark_for_recycle","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27393","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27393","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27393","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27393","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27393","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-27393 cve-2024-27393 xen-netfront: add missing skb_mark_for_recycle microsoft msrc msrc"},{"id":"CVE-2024-27395","cve":"CVE-2024-27395","title":"net: openvswitch: Fix Use-After-Free in ovs_ct_exit","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27395","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27395","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27395","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27395","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27395","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-27395 cve-2024-27395 net: openvswitch: fix use-after-free in ovs_ct_exit microsoft msrc msrc"},{"id":"CVE-2024-27400","cve":"CVE-2024-27400","title":"drm/amdgpu: once more fix the call oder in amdgpu_ttm_move() v2","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27400","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27400","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27400","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27400","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27400","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-27400 cve-2024-27400 drm/amdgpu: once more fix the call oder in amdgpu_ttm_move() v2 microsoft msrc msrc"},{"id":"CVE-2024-27407","cve":"CVE-2024-27407","title":"fs/ntfs3: Fixed overflow check in mi_enum_attr()","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27407","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27407","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27407","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.4,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27407","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27407","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-27407 cve-2024-27407 fs/ntfs3: fixed overflow check in mi_enum_attr() microsoft msrc msrc"},{"id":"CVE-2024-27408","cve":"CVE-2024-27408","title":"dmaengine: dw-edma: eDMA: Add sync read before starting the DMA transfer in remote setup","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27408","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27408","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27408","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.7,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27408","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27408","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-27408 cve-2024-27408 dmaengine: dw-edma: edma: add sync read before starting the dma transfer in remote setup microsoft msrc msrc"},{"id":"CVE-2024-27418","cve":"CVE-2024-27418","title":"net: mctp: take ownership of skb in mctp_local_output","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27418","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27418","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27418","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27418","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27418","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-27418 cve-2024-27418 net: mctp: take ownership of skb in mctp_local_output microsoft msrc msrc"},{"id":"CVE-2024-27435","cve":"CVE-2024-27435","title":"nvme: fix reconnection fail due to reserved tag allocation","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27435","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27435","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27435","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27435","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27435","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-27435 cve-2024-27435 nvme: fix reconnection fail due to reserved tag allocation microsoft msrc msrc"},{"id":"CVE-2024-27436","cve":"CVE-2024-27436","title":"ALSA: usb-audio: Stop parsing channels bits when all channels are found.","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27436","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27436","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27436","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.3,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27436","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27436","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-27436 cve-2024-27436 alsa: usb-audio: stop parsing channels bits when all channels are found. microsoft msrc msrc"},{"id":"CVE-2024-2746","cve":"CVE-2024-2746","title":"Incomplete fix for CVE-2024-1929","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-2746","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-2746","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-2746","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-2746","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-2746","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-2746 cve-2024-2746 incomplete fix for cve-2024-1929 microsoft msrc msrc"},{"id":"CVE-2024-27982","cve":"CVE-2024-27982","title":"The team has identified a critical vulnerability in the http server of the most recent version of Node where malformed headers can lead to HTTP request smuggling. Specifically if a","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27982","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27982","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27982","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27982","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-27982","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-27982 cve-2024-27982 the team has identified a critical vulnerability in the http server of the most recent version of node where malformed headers can lead to http request smuggling. specifically if a microsoft msrc msrc"},{"id":"CVE-2024-28863","cve":"CVE-2024-28863","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28863","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28863","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28863","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28863","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28863","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-28863 cve-2024-28863 mariner microsoft msrc msrc"},{"id":"CVE-2024-28899","cve":"CVE-2024-28899","title":"Secure Boot Security Feature Bypass Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28899","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28899","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28899","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28899","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28899","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-28899 cve-2024-28899 secure boot security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2024-28928","cve":"CVE-2024-28928","title":"SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28928","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28928","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28928","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28928","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28928","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-28928 cve-2024-28928 sql server native client ole db provider remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-29038","cve":"CVE-2024-29038","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29038","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29038","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29038","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.3,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29038","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29038","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-29038 cve-2024-29038 mariner microsoft msrc msrc"},{"id":"CVE-2024-29039","cve":"CVE-2024-29039","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29039","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29039","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29039","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29039","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29039","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2024-29039 cve-2024-29039 mariner microsoft msrc msrc"},{"id":"CVE-2024-29157","cve":"CVE-2024-29157","title":"HDF5 through 1.14.3 contains a heap buffer overflow in H5HG_read resulting in the corruption of the instruction pointer and causing denial of service or potential code execution.","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29157","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29157","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29157","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29157","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29157","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2024-29157 cve-2024-29157 hdf5 through 1.14.3 contains a heap buffer overflow in h5hg_read resulting in the corruption of the instruction pointer and causing denial of service or potential code execution. microsoft msrc msrc"},{"id":"CVE-2024-29158","cve":"CVE-2024-29158","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29158","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29158","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29158","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.4,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29158","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29158","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-29158 cve-2024-29158 mariner microsoft msrc msrc"},{"id":"CVE-2024-29159","cve":"CVE-2024-29159","title":"HDF5 through 1.14.3 contains a buffer overflow in H5Z__filter_scaleoffset resulting in the corruption of the instruction pointer and causing denial of service or potential code exe","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29159","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29159","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29159","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29159","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29159","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2024-29159 cve-2024-29159 hdf5 through 1.14.3 contains a buffer overflow in h5z__filter_scaleoffset resulting in the corruption of the instruction pointer and causing denial of service or potential code exe microsoft msrc msrc"},{"id":"CVE-2024-29160","cve":"CVE-2024-29160","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29160","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29160","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29160","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.4,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29160","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29160","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-29160 cve-2024-29160 mariner microsoft msrc msrc"},{"id":"CVE-2024-29161","cve":"CVE-2024-29161","title":"HDF5 through 1.14.3 contains a heap buffer overflow in H5A__attr_release_table resulting in the corruption of the instruction pointer and causing denial of service or potential cod","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29161","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29161","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29161","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29161","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29161","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-29161 cve-2024-29161 hdf5 through 1.14.3 contains a heap buffer overflow in h5a__attr_release_table resulting in the corruption of the instruction pointer and causing denial of service or potential cod microsoft msrc msrc"},{"id":"CVE-2024-29162","cve":"CVE-2024-29162","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29162","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29162","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29162","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.4,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29162","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29162","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-29162 cve-2024-29162 mariner microsoft msrc msrc"},{"id":"CVE-2024-29163","cve":"CVE-2024-29163","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29163","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29163","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29163","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.4,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29163","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29163","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-29163 cve-2024-29163 mariner microsoft msrc msrc"},{"id":"CVE-2024-29164","cve":"CVE-2024-29164","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29164","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29164","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29164","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29164","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29164","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2024-29164 cve-2024-29164 mariner microsoft msrc msrc"},{"id":"CVE-2024-29165","cve":"CVE-2024-29165","title":"HDF5 through 1.14.3 contains a buffer overflow in H5Z__filter_fletcher32 resulting in the corruption of the instruction pointer and causing denial of service or potential code exec","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29165","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29165","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29165","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.4,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29165","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29165","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-29165 cve-2024-29165 hdf5 through 1.14.3 contains a buffer overflow in h5z__filter_fletcher32 resulting in the corruption of the instruction pointer and causing denial of service or potential code exec microsoft msrc msrc"},{"id":"CVE-2024-29166","cve":"CVE-2024-29166","title":"HDF5 through 1.14.3 contains a buffer overflow in H5O__linfo_decode resulting in the corruption of the instruction pointer and causing denial of service or potential code execution","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29166","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29166","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29166","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.7,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29166","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29166","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-29166 cve-2024-29166 hdf5 through 1.14.3 contains a buffer overflow in h5o__linfo_decode resulting in the corruption of the instruction pointer and causing denial of service or potential code execution microsoft msrc msrc"},{"id":"CVE-2024-29994","cve":"CVE-2024-29994","title":"Microsoft Windows SCSI Class System File Elevation of Privilege Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29994","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29994","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29994","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29994","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29994","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-29994 cve-2024-29994 microsoft windows scsi class system file elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-29996","cve":"CVE-2024-29996","title":"Windows Common Log File System Driver Elevation of Privilege Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29996","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29996","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29996","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29996","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29996","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-29996 cve-2024-29996 windows common log file system driver elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-29997","cve":"CVE-2024-29997","title":"Windows Mobile Broadband Driver Remote Code Execution Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29997","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29997","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29997","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29997","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29997","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-29997 cve-2024-29997 windows mobile broadband driver remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-29998","cve":"CVE-2024-29998","title":"Windows Mobile Broadband Driver Remote Code Execution Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29998","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29998","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29998","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29998","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29998","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-29998 cve-2024-29998 windows mobile broadband driver remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-29999","cve":"CVE-2024-29999","title":"Windows Mobile Broadband Driver Remote Code Execution Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29999","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29999","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29999","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29999","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29999","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-29999 cve-2024-29999 windows mobile broadband driver remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30000","cve":"CVE-2024-30000","title":"Windows Mobile Broadband Driver Remote Code Execution Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30000","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30000","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30000","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30000","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30000","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-30000 cve-2024-30000 windows mobile broadband driver remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30001","cve":"CVE-2024-30001","title":"Windows Mobile Broadband Driver Remote Code Execution Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30001","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30001","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30001","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30001","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30001","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-30001 cve-2024-30001 windows mobile broadband driver remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30002","cve":"CVE-2024-30002","title":"Windows Mobile Broadband Driver Remote Code Execution Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30002","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30002","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30002","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30002","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30002","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-30002 cve-2024-30002 windows mobile broadband driver remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30003","cve":"CVE-2024-30003","title":"Windows Mobile Broadband Driver Remote Code Execution Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30003","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30003","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30003","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30003","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30003","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-30003 cve-2024-30003 windows mobile broadband driver remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30004","cve":"CVE-2024-30004","title":"Windows Mobile Broadband Driver Remote Code Execution Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30004","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30004","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30004","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30004","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30004","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-30004 cve-2024-30004 windows mobile broadband driver remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30005","cve":"CVE-2024-30005","title":"Windows Mobile Broadband Driver Remote Code Execution Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30005","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30005","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30005","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30005","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30005","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-30005 cve-2024-30005 windows mobile broadband driver remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30006","cve":"CVE-2024-30006","title":"Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30006","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30006","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30006","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30006","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30006","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-30006 cve-2024-30006 microsoft wdac ole db provider for sql server remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30007","cve":"CVE-2024-30007","title":"Microsoft Brokering File System Elevation of Privilege Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30007","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30007","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30007","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30007","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30007","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-30007 cve-2024-30007 microsoft brokering file system elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30008","cve":"CVE-2024-30008","title":"Windows DWM Core Library Information Disclosure Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30008","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30008","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30008","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30008","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30008","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-30008 cve-2024-30008 windows dwm core library information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30009","cve":"CVE-2024-30009","title":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30009","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30009","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30009","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30009","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30009","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-30009 cve-2024-30009 windows routing and remote access service (rras) remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30010","cve":"CVE-2024-30010","title":"Windows Hyper-V Remote Code Execution Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30010","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30010","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30010","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30010","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30010","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-30010 cve-2024-30010 windows hyper-v remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30011","cve":"CVE-2024-30011","title":"Windows Hyper-V Denial of Service Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30011","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30011","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30011","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30011","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30011","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-30011 cve-2024-30011 windows hyper-v denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30012","cve":"CVE-2024-30012","title":"Windows Mobile Broadband Driver Remote Code Execution Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30012","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30012","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30012","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30012","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30012","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-30012 cve-2024-30012 windows mobile broadband driver remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30013","cve":"CVE-2024-30013","title":"Windows MultiPoint Services Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30013","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30013","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30013","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30013","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30013","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-30013 cve-2024-30013 windows multipoint services remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30014","cve":"CVE-2024-30014","title":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30014","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30014","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30014","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30014","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30014","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-30014 cve-2024-30014 windows routing and remote access service (rras) remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30015","cve":"CVE-2024-30015","title":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30015","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30015","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30015","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30015","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30015","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-30015 cve-2024-30015 windows routing and remote access service (rras) remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30016","cve":"CVE-2024-30016","title":"Windows Cryptographic Services Information Disclosure Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30016","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30016","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30016","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30016","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30016","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-30016 cve-2024-30016 windows cryptographic services information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30017","cve":"CVE-2024-30017","title":"Windows Hyper-V Remote Code Execution Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30017","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30017","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30017","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30017","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30017","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-30017 cve-2024-30017 windows hyper-v remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30018","cve":"CVE-2024-30018","title":"Windows Kernel Elevation of Privilege Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30018","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30018","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30018","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30018","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30018","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-30018 cve-2024-30018 windows kernel elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30019","cve":"CVE-2024-30019","title":"DHCP Server Service Denial of Service Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30019","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30019","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30019","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30019","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30019","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-30019 cve-2024-30019 dhcp server service denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30020","cve":"CVE-2024-30020","title":"Windows Cryptographic Services Remote Code Execution Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30020","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30020","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30020","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.1,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30020","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30020","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-30020 cve-2024-30020 windows cryptographic services remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30021","cve":"CVE-2024-30021","title":"Windows Mobile Broadband Driver Remote Code Execution Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30021","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30021","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30021","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30021","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30021","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-30021 cve-2024-30021 windows mobile broadband driver remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30022","cve":"CVE-2024-30022","title":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30022","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30022","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30022","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30022","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30022","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-30022 cve-2024-30022 windows routing and remote access service (rras) remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30023","cve":"CVE-2024-30023","title":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30023","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30023","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30023","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30023","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30023","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-30023 cve-2024-30023 windows routing and remote access service (rras) remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30024","cve":"CVE-2024-30024","title":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30024","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30024","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30024","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30024","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30024","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-30024 cve-2024-30024 windows routing and remote access service (rras) remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30025","cve":"CVE-2024-30025","title":"Windows Common Log File System Driver Elevation of Privilege Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30025","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30025","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30025","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30025","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30025","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-30025 cve-2024-30025 windows common log file system driver elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30027","cve":"CVE-2024-30027","title":"NTFS Elevation of Privilege Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30027","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30027","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30027","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30027","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30027","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-30027 cve-2024-30027 ntfs elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30028","cve":"CVE-2024-30028","title":"Win32k Elevation of Privilege Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30028","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30028","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30028","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30028","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30028","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-30028 cve-2024-30028 win32k elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30029","cve":"CVE-2024-30029","title":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30029","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30029","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30029","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30029","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30029","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-30029 cve-2024-30029 windows routing and remote access service (rras) remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30030","cve":"CVE-2024-30030","title":"Win32k Elevation of Privilege Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30030","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30030","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30030","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30030","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30030","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-30030 cve-2024-30030 win32k elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30031","cve":"CVE-2024-30031","title":"Windows CNG Key Isolation Service Elevation of Privilege Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30031","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30031","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30031","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30031","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30031","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-30031 cve-2024-30031 windows cng key isolation service elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30032","cve":"CVE-2024-30032","title":"Windows DWM Core Library Elevation of Privilege Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30032","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30032","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30032","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30032","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30032","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-30032 cve-2024-30032 windows dwm core library elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30033","cve":"CVE-2024-30033","title":"Windows Search Service Elevation of Privilege Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30033","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30033","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30033","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30033","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30033","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-30033 cve-2024-30033 windows search service elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30034","cve":"CVE-2024-30034","title":"Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30034","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30034","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30034","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30034","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30034","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-30034 cve-2024-30034 windows cloud files mini filter driver information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30035","cve":"CVE-2024-30035","title":"Windows DWM Core Library Elevation of Privilege Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30035","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30035","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30035","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30035","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30035","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-30035 cve-2024-30035 windows dwm core library elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30036","cve":"CVE-2024-30036","title":"Windows Deployment Services Information Disclosure Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30036","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30036","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30036","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30036","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30036","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-30036 cve-2024-30036 windows deployment services information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30037","cve":"CVE-2024-30037","title":"Windows Common Log File System Driver Elevation of Privilege Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30037","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30037","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30037","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30037","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30037","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-30037 cve-2024-30037 windows common log file system driver elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30038","cve":"CVE-2024-30038","title":"Win32k Elevation of Privilege Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30038","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30038","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30038","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30038","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30038","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-30038 cve-2024-30038 win32k elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30039","cve":"CVE-2024-30039","title":"Windows Remote Access Connection Manager Information Disclosure Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30039","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30039","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30039","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30039","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30039","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-30039 cve-2024-30039 windows remote access connection manager information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30040","cve":"CVE-2024-30040","title":"Windows MSHTML Platform Security Feature Bypass Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30040","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30040","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30040","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30040","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30040","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-30040 cve-2024-30040 windows mshtml platform security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30041","cve":"CVE-2024-30041","title":"Microsoft Bing Search Spoofing Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30041","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30041","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30041","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.4,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30041","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30041","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-30041 cve-2024-30041 microsoft bing search spoofing vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30042","cve":"CVE-2024-30042","title":"Microsoft Excel Remote Code Execution Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30042","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30042","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30042","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30042","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30042","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-30042 cve-2024-30042 microsoft excel remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30043","cve":"CVE-2024-30043","title":"Microsoft SharePoint Server Information Disclosure Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30043","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30043","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30043","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30043","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30043","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-30043 cve-2024-30043 microsoft sharepoint server information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30044","cve":"CVE-2024-30044","title":"Microsoft SharePoint Server Remote Code Execution Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30044","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30044","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30044","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.2,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30044","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30044","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-30044 cve-2024-30044 microsoft sharepoint server remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30045","cve":"CVE-2024-30045","title":".NET and Visual Studio Remote Code Execution Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30045","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30045","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30045","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.3,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30045","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30045","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-30045 cve-2024-30045 .net and visual studio remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30046","cve":"CVE-2024-30046","title":"Visual Studio Denial of Service Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30046","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30046","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30046","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.9,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30046","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30046","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-30046 cve-2024-30046 visual studio denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30047","cve":"CVE-2024-30047","title":"Dynamics 365 Customer Insights Spoofing Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30047","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30047","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30047","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.6,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30047","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30047","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-30047 cve-2024-30047 dynamics 365 customer insights spoofing vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30048","cve":"CVE-2024-30048","title":"Dynamics 365 Customer Insights Spoofing Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30048","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30048","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30048","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.6,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30048","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30048","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-30048 cve-2024-30048 dynamics 365 customer insights spoofing vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30049","cve":"CVE-2024-30049","title":"Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30049","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30049","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30049","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30049","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30049","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-30049 cve-2024-30049 windows win32 kernel subsystem elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30050","cve":"CVE-2024-30050","title":"Windows Mark of the Web Security Feature Bypass Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30050","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30050","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30050","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.4,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30050","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30050","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-30050 cve-2024-30050 windows mark of the web security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30051","cve":"CVE-2024-30051","title":"Windows DWM Core Library Elevation of Privilege Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30051","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30051","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30051","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30051","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30051","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-30051 cve-2024-30051 windows dwm core library elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30053","cve":"CVE-2024-30053","title":"Azure Migrate Cross-Site Scripting Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30053","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30053","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30053","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30053","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30053","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-30053 cve-2024-30053 azure migrate cross-site scripting vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30054","cve":"CVE-2024-30054","title":"Microsoft Power BI Client JavaScript SDK Information Disclosure Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30054","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30054","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30054","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30054","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30054","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-30054 cve-2024-30054 microsoft power bi client javascript sdk information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30055","cve":"CVE-2024-30055","title":"Microsoft Edge (Chromium-based) Spoofing Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30055","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30055","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30055","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.4,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30055","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30055","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-30055 cve-2024-30055 microsoft edge (chromium-based) spoofing vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30056","cve":"CVE-2024-30056","title":"Microsoft Edge (Chromium-based) Information Disclosure Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30056","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30056","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30056","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30056","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30056","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-30056 cve-2024-30056 microsoft edge (chromium-based) information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30059","cve":"CVE-2024-30059","title":"Microsoft Intune for Android Mobile Application Management Tampering Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30059","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30059","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30059","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.1,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30059","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30059","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-30059 cve-2024-30059 microsoft intune for android mobile application management tampering vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30060","cve":"CVE-2024-30060","title":"Azure Monitor Agent Elevation of Privilege Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30060","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30060","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30060","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30060","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30060","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-30060 cve-2024-30060 azure monitor agent elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30061","cve":"CVE-2024-30061","title":"Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30061","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30061","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30061","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.3,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30061","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30061","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-30061 cve-2024-30061 microsoft dynamics 365 (on-premises) information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30071","cve":"CVE-2024-30071","title":"Windows Remote Access Connection Manager Information Disclosure Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30071","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30071","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30071","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.7,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30071","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30071","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-30071 cve-2024-30071 windows remote access connection manager information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30073","cve":"CVE-2024-30073","title":"Windows Security Zone Mapping Security Feature Bypass Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30073","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30073","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30073","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30073","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30073","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-30073 cve-2024-30073 windows security zone mapping security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30079","cve":"CVE-2024-30079","title":"Windows Remote Access Connection Manager Elevation of Privilege Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30079","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30079","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30079","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30079","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30079","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-30079 cve-2024-30079 windows remote access connection manager elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30081","cve":"CVE-2024-30081","title":"Windows NTLM Spoofing Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30081","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30081","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30081","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30081","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30081","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-30081 cve-2024-30081 windows ntlm spoofing vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30098","cve":"CVE-2024-30098","title":"Windows Cryptographic Services Security Feature Bypass Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30098","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30098","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30098","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30098","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30098","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-30098 cve-2024-30098 windows cryptographic services security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30105","cve":"CVE-2024-30105","title":".NET and Visual Studio Denial of Service Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30105","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30105","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30105","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30105","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30105","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-30105 cve-2024-30105 .net and visual studio denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2024-30251","cve":"CVE-2024-30251","title":"Denial of service when trying to parse malformed POST requests in aiohttp","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30251","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30251","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30251","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30251","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30251","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-30251 cve-2024-30251 denial of service when trying to parse malformed post requests in aiohttp microsoft msrc msrc"},{"id":"CVE-2024-31583","cve":"CVE-2024-31583","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-31583","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-31583","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-31583","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-31583","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-31583","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-31583 cve-2024-31583 mariner microsoft msrc msrc"},{"id":"CVE-2024-31584","cve":"CVE-2024-31584","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-31584","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-31584","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-31584","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-31584","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-31584","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-31584 cve-2024-31584 mariner microsoft msrc msrc"},{"id":"CVE-2024-31744","cve":"CVE-2024-31744","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-31744","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-31744","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-31744","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-31744","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-31744","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-31744 cve-2024-31744 mariner microsoft msrc msrc"},{"id":"CVE-2024-31755","cve":"CVE-2024-31755","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-31755","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-31755","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-31755","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.6,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-31755","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-31755","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-31755 cve-2024-31755 mariner microsoft msrc msrc"},{"id":"CVE-2024-32002","cve":"CVE-2024-32002","title":"GitHub: CVE-2024-32002 Recursive clones on case-insensitive filesystems that support symlinks are susceptible to Remote Code Execution","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32002","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32002","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32002","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32002","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32002","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2024-32002 cve-2024-32002 github: cve-2024-32002 recursive clones on case-insensitive filesystems that support symlinks are susceptible to remote code execution microsoft msrc msrc"},{"id":"CVE-2024-32004","cve":"CVE-2024-32004","title":"GitHub: CVE-2024-32004 Remote Code Execution while cloning special-crafted local repositories","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32004","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32004","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32004","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.1,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32004","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32004","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-32004 cve-2024-32004 github: cve-2024-32004 remote code execution while cloning special-crafted local repositories microsoft msrc msrc"},{"id":"CVE-2024-32020","cve":"CVE-2024-32020","title":"Cloning local Git repository by untrusted user allows the untrusted user to modify objects in the cloned repository at will","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32020","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32020","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32020","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":3.9,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32020","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32020","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2024-32020 cve-2024-32020 cloning local git repository by untrusted user allows the untrusted user to modify objects in the cloned repository at will microsoft msrc msrc"},{"id":"CVE-2024-32021","cve":"CVE-2024-32021","title":"Local Git clone may hardlink arbitrary user-readable files into the new repository's \"objects/\" directory","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32021","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32021","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32021","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":3.9,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32021","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32021","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2024-32021 cve-2024-32021 local git clone may hardlink arbitrary user-readable files into the new repository's \"objects/\" directory microsoft msrc msrc"},{"id":"CVE-2024-32465","cve":"CVE-2024-32465","title":"Git's protections for cloning untrusted repositories can be bypassed","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32465","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32465","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32465","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.3,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32465","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32465","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-32465 cve-2024-32465 git's protections for cloning untrusted repositories can be bypassed microsoft msrc msrc"},{"id":"CVE-2024-32487","cve":"CVE-2024-32487","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32487","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32487","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32487","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.6,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32487","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32487","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-32487 cve-2024-32487 mariner microsoft msrc msrc"},{"id":"CVE-2024-32605","cve":"CVE-2024-32605","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32605","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32605","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32605","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32605","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32605","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-32605 cve-2024-32605 mariner microsoft msrc msrc"},{"id":"CVE-2024-32607","cve":"CVE-2024-32607","title":"HDF5 Library through 1.14.3 has a SEGV in H5A__close in H5Aint.c resulting in the corruption of the instruction pointer.","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32607","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32607","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32607","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.7,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32607","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32607","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-32607 cve-2024-32607 hdf5 library through 1.14.3 has a segv in h5a__close in h5aint.c resulting in the corruption of the instruction pointer. microsoft msrc msrc"},{"id":"CVE-2024-32609","cve":"CVE-2024-32609","title":"HDF5 Library through 1.14.3 allows stack consumption in the function H5E_printf_stack in H5Eint.c.","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32609","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32609","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32609","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32609","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32609","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-32609 cve-2024-32609 hdf5 library through 1.14.3 allows stack consumption in the function h5e_printf_stack in h5eint.c. microsoft msrc msrc"},{"id":"CVE-2024-32610","cve":"CVE-2024-32610","title":"HDF5 Library through 1.14.3 has a SEGV in H5T_close_real in H5T.c resulting in a corrupted instruction pointer.","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32610","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32610","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32610","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.7,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32610","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32610","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-32610 cve-2024-32610 hdf5 library through 1.14.3 has a segv in h5t_close_real in h5t.c resulting in a corrupted instruction pointer. microsoft msrc msrc"},{"id":"CVE-2024-32611","cve":"CVE-2024-32611","title":"HDF5 Library through 1.14.3 may use an uninitialized value in H5A__attr_release_table in H5Aint.c.","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32611","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32611","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32611","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32611","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32611","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2024-32611 cve-2024-32611 hdf5 library through 1.14.3 may use an uninitialized value in h5a__attr_release_table in h5aint.c. microsoft msrc msrc"},{"id":"CVE-2024-32612","cve":"CVE-2024-32612","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32612","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32612","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32612","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.4,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32612","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32612","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-32612 cve-2024-32612 mariner microsoft msrc msrc"},{"id":"CVE-2024-32613","cve":"CVE-2024-32613","title":"HDF5 Library through 1.14.3 contains a heap-based buffer over-read in the function H5HL__fl_deserialize in H5HLcache.c a different vulnerability than CVE-2024-32612.","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32613","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32613","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32613","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.4,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32613","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32613","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-32613 cve-2024-32613 hdf5 library through 1.14.3 contains a heap-based buffer over-read in the function h5hl__fl_deserialize in h5hlcache.c a different vulnerability than cve-2024-32612. microsoft msrc msrc"},{"id":"CVE-2024-32614","cve":"CVE-2024-32614","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32614","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32614","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32614","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32614","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32614","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-32614 cve-2024-32614 mariner microsoft msrc msrc"},{"id":"CVE-2024-32615","cve":"CVE-2024-32615","title":"HDF5 Library through 1.14.3 contains a heap-based buffer overflow in H5Z__nbit_decompress_one_byte in H5Znbit.c caused by the earlier use of an initialized pointer.","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32615","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32615","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32615","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32615","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32615","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2024-32615 cve-2024-32615 hdf5 library through 1.14.3 contains a heap-based buffer overflow in h5z__nbit_decompress_one_byte in h5znbit.c caused by the earlier use of an initialized pointer. microsoft msrc msrc"},{"id":"CVE-2024-32616","cve":"CVE-2024-32616","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32616","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32616","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32616","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.4,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32616","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32616","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-32616 cve-2024-32616 mariner microsoft msrc msrc"},{"id":"CVE-2024-32617","cve":"CVE-2024-32617","title":"HDF5 Library through 1.14.3 contains a heap-based buffer over-read caused by the unsafe use of strdup in H5MM_xstrdup in H5MM.c (called from H5G__ent_to_link in H5Glink.c).","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32617","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32617","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32617","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32617","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32617","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-32617 cve-2024-32617 hdf5 library through 1.14.3 contains a heap-based buffer over-read caused by the unsafe use of strdup in h5mm_xstrdup in h5mm.c (called from h5g__ent_to_link in h5glink.c). microsoft msrc msrc"},{"id":"CVE-2024-32618","cve":"CVE-2024-32618","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32618","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32618","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32618","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.4,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32618","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32618","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-32618 cve-2024-32618 mariner microsoft msrc msrc"},{"id":"CVE-2024-32619","cve":"CVE-2024-32619","title":"HDF5 Library through 1.14.3 contains a heap-based buffer overflow in H5T_copy_reopen in H5T.c resulting in the corruption of the instruction pointer.","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32619","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32619","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32619","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.4,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32619","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32619","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-32619 cve-2024-32619 hdf5 library through 1.14.3 contains a heap-based buffer overflow in h5t_copy_reopen in h5t.c resulting in the corruption of the instruction pointer. microsoft msrc msrc"},{"id":"CVE-2024-32620","cve":"CVE-2024-32620","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32620","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32620","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32620","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.4,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32620","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32620","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-32620 cve-2024-32620 mariner microsoft msrc msrc"},{"id":"CVE-2024-32621","cve":"CVE-2024-32621","title":"HDF5 Library through 1.14.3 contains a heap-based buffer overflow in H5HG_read in H5HG.c (called from H5VL__native_blob_get in H5VLnative_blob.c) resulting in the corruption of the","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32621","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32621","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32621","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32621","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32621","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2024-32621 cve-2024-32621 hdf5 library through 1.14.3 contains a heap-based buffer overflow in h5hg_read in h5hg.c (called from h5vl__native_blob_get in h5vlnative_blob.c) resulting in the corruption of the microsoft msrc msrc"},{"id":"CVE-2024-32622","cve":"CVE-2024-32622","title":"HDF5 Library through 1.14.3 contains a out-of-bounds read operation in H5FL_arr_malloc in H5FL.c (called from H5S_set_extent_simple in H5S.c).","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32622","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32622","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32622","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.1,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32622","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32622","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2024-32622 cve-2024-32622 hdf5 library through 1.14.3 contains a out-of-bounds read operation in h5fl_arr_malloc in h5fl.c (called from h5s_set_extent_simple in h5s.c). microsoft msrc msrc"},{"id":"CVE-2024-32623","cve":"CVE-2024-32623","title":"HDF5 Library through 1.14.3 contains a heap-based buffer overflow in H5VM_array_fill in H5VM.c (called from H5S_select_elements in H5Spoint.c).","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32623","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32623","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32623","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32623","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32623","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-32623 cve-2024-32623 hdf5 library through 1.14.3 contains a heap-based buffer overflow in h5vm_array_fill in h5vm.c (called from h5s_select_elements in h5spoint.c). microsoft msrc msrc"},{"id":"CVE-2024-32624","cve":"CVE-2024-32624","title":"HDF5 Library through 1.14.3 contains a heap-based buffer overflow in H5T__ref_mem_setnull in H5Tref.c (called from H5T__conv_ref in H5Tconv.c) resulting in the corruption of the in","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32624","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32624","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32624","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.4,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32624","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32624","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-32624 cve-2024-32624 hdf5 library through 1.14.3 contains a heap-based buffer overflow in h5t__ref_mem_setnull in h5tref.c (called from h5t__conv_ref in h5tconv.c) resulting in the corruption of the in microsoft msrc msrc"},{"id":"CVE-2024-32650","cve":"CVE-2024-32650","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32650","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32650","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32650","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32650","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32650","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-32650 cve-2024-32650 mariner microsoft msrc msrc"},{"id":"CVE-2024-32886","cve":"CVE-2024-32886","title":"Vitess vulnerable to infinite memory consumption and vtgate crash","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32886","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32886","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32886","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.9,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32886","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32886","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-32886 cve-2024-32886 vitess vulnerable to infinite memory consumption and vtgate crash microsoft msrc msrc"},{"id":"CVE-2024-32987","cve":"CVE-2024-32987","title":"Microsoft SharePoint Server Information Disclosure Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32987","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32987","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32987","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32987","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-32987","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-32987 cve-2024-32987 microsoft sharepoint server information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2024-33394","cve":"CVE-2024-33394","title":"An issue in kubevirt kubevirt v1.2.0 and before allows a local attacker to execute arbitrary code via a crafted command to get the token component.","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33394","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33394","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33394","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.9,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33394","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33394","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-33394 cve-2024-33394 an issue in kubevirt kubevirt v1.2.0 and before allows a local attacker to execute arbitrary code via a crafted command to get the token component. microsoft msrc msrc"},{"id":"CVE-2024-33599","cve":"CVE-2024-33599","title":"nscd: Stack-based buffer overflow in netgroup cache","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33599","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33599","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33599","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.1,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33599","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33599","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-33599 cve-2024-33599 nscd: stack-based buffer overflow in netgroup cache microsoft msrc msrc"},{"id":"CVE-2024-33600","cve":"CVE-2024-33600","title":"nscd: Null pointer crashes after notfound response","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33600","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33600","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33600","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.9,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33600","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33600","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-33600 cve-2024-33600 nscd: null pointer crashes after notfound response microsoft msrc msrc"},{"id":"CVE-2024-33601","cve":"CVE-2024-33601","title":"nscd: netgroup cache may terminate daemon on memory allocation failure","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33601","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33601","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33601","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33601","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33601","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-33601 cve-2024-33601 nscd: netgroup cache may terminate daemon on memory allocation failure microsoft msrc msrc"},{"id":"CVE-2024-33602","cve":"CVE-2024-33602","title":"nscd: netgroup cache assumes NSS callback uses in-buffer strings","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33602","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33602","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33602","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.6,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33602","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33602","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-33602 cve-2024-33602 nscd: netgroup cache assumes nss callback uses in-buffer strings microsoft msrc msrc"},{"id":"CVE-2024-33873","cve":"CVE-2024-33873","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33873","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33873","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33873","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33873","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33873","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-33873 cve-2024-33873 mariner microsoft msrc msrc"},{"id":"CVE-2024-33874","cve":"CVE-2024-33874","title":"HDF5 Library through 1.14.3 has a heap buffer overflow in H5O__mtime_new_encode in H5Omtime.c.","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33874","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33874","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33874","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33874","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33874","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2024-33874 cve-2024-33874 hdf5 library through 1.14.3 has a heap buffer overflow in h5o__mtime_new_encode in h5omtime.c. microsoft msrc msrc"},{"id":"CVE-2024-33875","cve":"CVE-2024-33875","title":"HDF5 Library through 1.14.3 has a heap-based buffer overflow in H5O__layout_encode in H5Olayout.c resulting in the corruption of the instruction pointer.","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33875","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33875","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33875","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.7,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33875","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33875","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-33875 cve-2024-33875 hdf5 library through 1.14.3 has a heap-based buffer overflow in h5o__layout_encode in h5olayout.c resulting in the corruption of the instruction pointer. microsoft msrc msrc"},{"id":"CVE-2024-33876","cve":"CVE-2024-33876","title":"HDF5 Library through 1.14.3 has a heap buffer overflow in H5S__point_deserialize in H5Spoint.c.","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33876","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33876","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33876","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.7,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33876","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33876","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-33876 cve-2024-33876 hdf5 library through 1.14.3 has a heap buffer overflow in h5s__point_deserialize in h5spoint.c. microsoft msrc msrc"},{"id":"CVE-2024-33877","cve":"CVE-2024-33877","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33877","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33877","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33877","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33877","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-33877","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-33877 cve-2024-33877 mariner microsoft msrc msrc"},{"id":"CVE-2024-34062","cve":"CVE-2024-34062","title":"tqdm CLI arguments injection attack","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-34062","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-34062","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-34062","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-34062","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-34062","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-34062 cve-2024-34062 tqdm cli arguments injection attack microsoft msrc msrc"},{"id":"CVE-2024-34064","cve":"CVE-2024-34064","title":"Jinja vulnerable to HTML attribute injection when passing user input as keys to xmlattr filter","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-34064","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-34064","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-34064","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.4,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-34064","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-34064","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-34064 cve-2024-34064 jinja vulnerable to html attribute injection when passing user input as keys to xmlattr filter microsoft msrc msrc"},{"id":"CVE-2024-34069","cve":"CVE-2024-34069","title":"Werkzeug's improper usage of a pathname and improper CSRF protection results in the remote command execution","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-34069","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-34069","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-34069","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-34069","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-34069","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-34069 cve-2024-34069 werkzeug's improper usage of a pathname and improper csrf protection results in the remote command execution microsoft msrc msrc"},{"id":"CVE-2024-34250","cve":"CVE-2024-34250","title":"A heap buffer overflow vulnerability was discovered in Bytecode Alliance wasm-micro-runtime v2.0.0 which allows a remote attacker to cause at least a denial of service via the \"was","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-34250","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-34250","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-34250","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.2,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-34250","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-34250","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-34250 cve-2024-34250 a heap buffer overflow vulnerability was discovered in bytecode alliance wasm-micro-runtime v2.0.0 which allows a remote attacker to cause at least a denial of service via the \"was microsoft msrc msrc"},{"id":"CVE-2024-34397","cve":"CVE-2024-34397","title":"An issue was discovered in GNOME GLib before 2.78.5, and 2.79.x and 2.80.x before 2.80.1. When a GDBus-based client subscribes to signals from a trusted system service such as Netw","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-34397","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-34397","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-34397","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.2,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-34397","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-34397","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-34397 cve-2024-34397 an issue was discovered in gnome glib before 2.78.5, and 2.79.x and 2.80.x before 2.80.1. when a gdbus-based client subscribes to signals from a trusted system service such as netw microsoft msrc msrc"},{"id":"CVE-2024-34402","cve":"CVE-2024-34402","title":"An issue was discovered in uriparser through 0.9.7. ComposeQueryEngine in UriQuery.c has an integer overflow via long keys or values, with a resultant buffer overflow.","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-34402","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-34402","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-34402","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.6,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-34402","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-34402","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-34402 cve-2024-34402 an issue was discovered in uriparser through 0.9.7. composequeryengine in uriquery.c has an integer overflow via long keys or values, with a resultant buffer overflow. microsoft msrc msrc"},{"id":"CVE-2024-34403","cve":"CVE-2024-34403","title":"An issue was discovered in uriparser through 0.9.7. ComposeQueryMallocExMm in UriQuery.c has an integer overflow via a long string.","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-34403","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-34403","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-34403","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.9,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-34403","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-34403","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-34403 cve-2024-34403 an issue was discovered in uriparser through 0.9.7. composequerymallocexmm in uriquery.c has an integer overflow via a long string. microsoft msrc msrc"},{"id":"CVE-2024-34459","cve":"CVE-2024-34459","title":"An issue was discovered in xmllint (from libxml2) before 2.11.8 and 2.12.x before 2.12.7. Formatting error messages with xmllint --htmlout can result in a buffer over-read in xmlHT","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-34459","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-34459","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-34459","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-34459","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-34459","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-34459 cve-2024-34459 an issue was discovered in xmllint (from libxml2) before 2.11.8 and 2.12.x before 2.12.7. formatting error messages with xmllint --htmlout can result in a buffer over-read in xmlht microsoft msrc msrc"},{"id":"CVE-2024-35176","cve":"CVE-2024-35176","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35176","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35176","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35176","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.3,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35176","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35176","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-35176 cve-2024-35176 mariner microsoft msrc msrc"},{"id":"CVE-2024-35195","cve":"CVE-2024-35195","title":"Requests `Session` object does not verify requests after making first request with verify=False","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35195","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35195","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35195","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.6,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35195","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35195","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-35195 cve-2024-35195 requests `session` object does not verify requests after making first request with verify=false microsoft msrc msrc"},{"id":"CVE-2024-35256","cve":"CVE-2024-35256","title":"SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35256","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35256","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35256","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35256","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35256","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-35256 cve-2024-35256 sql server native client ole db provider remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-35261","cve":"CVE-2024-35261","title":"Azure Network Watcher VM Extension Elevation of Privilege Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35261","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35261","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35261","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35261","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35261","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-35261 cve-2024-35261 azure network watcher vm extension elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-35264","cve":"CVE-2024-35264","title":".NET and Visual Studio Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35264","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35264","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35264","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.1,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35264","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35264","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-35264 cve-2024-35264 .net and visual studio remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-35266","cve":"CVE-2024-35266","title":"Azure DevOps Server Spoofing Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35266","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35266","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35266","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.6,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35266","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35266","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-35266 cve-2024-35266 azure devops server spoofing vulnerability microsoft msrc msrc"},{"id":"CVE-2024-35267","cve":"CVE-2024-35267","title":"Azure DevOps Server Spoofing Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35267","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35267","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35267","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.6,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35267","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35267","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-35267 cve-2024-35267 azure devops server spoofing vulnerability microsoft msrc msrc"},{"id":"CVE-2024-35270","cve":"CVE-2024-35270","title":"Windows iSCSI Service Denial of Service Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35270","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35270","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35270","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.3,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35270","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35270","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-35270 cve-2024-35270 windows iscsi service denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2024-35271","cve":"CVE-2024-35271","title":"SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35271","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35271","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35271","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35271","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35271","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-35271 cve-2024-35271 sql server native client ole db provider remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-35272","cve":"CVE-2024-35272","title":"SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35272","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35272","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35272","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35272","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35272","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-35272 cve-2024-35272 sql server native client ole db provider remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-35784","cve":"CVE-2024-35784","title":"btrfs: fix deadlock with fiemap and extent locking","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35784","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35784","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35784","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35784","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35784","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-35784 cve-2024-35784 btrfs: fix deadlock with fiemap and extent locking microsoft msrc msrc"},{"id":"CVE-2024-35799","cve":"CVE-2024-35799","title":"drm/amd/display: Prevent crash when disable stream","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35799","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35799","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35799","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.2,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35799","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35799","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-35799 cve-2024-35799 drm/amd/display: prevent crash when disable stream microsoft msrc msrc"},{"id":"CVE-2024-35801","cve":"CVE-2024-35801","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35801","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35801","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35801","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35801","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35801","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-35801 cve-2024-35801 mariner microsoft msrc msrc"},{"id":"CVE-2024-35803","cve":"CVE-2024-35803","title":"x86/efistub: Call mixed mode boot services on the firmware's stack","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35803","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35803","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35803","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35803","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35803","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-35803 cve-2024-35803 x86/efistub: call mixed mode boot services on the firmware's stack microsoft msrc msrc"},{"id":"CVE-2024-35808","cve":"CVE-2024-35808","title":"md/dm-raid: don't call md_reap_sync_thread() directly","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35808","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35808","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35808","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35808","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35808","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-35808 cve-2024-35808 md/dm-raid: don't call md_reap_sync_thread() directly microsoft msrc msrc"},{"id":"CVE-2024-35823","cve":"CVE-2024-35823","title":"vt: fix unicode buffer corruption when deleting characters","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35823","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35823","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35823","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.3,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35823","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35823","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-35823 cve-2024-35823 vt: fix unicode buffer corruption when deleting characters microsoft msrc msrc"},{"id":"CVE-2024-35826","cve":"CVE-2024-35826","title":"block: Fix page refcounts for unaligned buffers in __bio_release_pages()","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35826","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35826","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35826","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.6,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35826","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35826","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-35826 cve-2024-35826 block: fix page refcounts for unaligned buffers in __bio_release_pages() microsoft msrc msrc"},{"id":"CVE-2024-35839","cve":"CVE-2024-35839","title":"netfilter: bridge: replace physindev with physinif in nf_bridge_info","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35839","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35839","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35839","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35839","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35839","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-35839 cve-2024-35839 netfilter: bridge: replace physindev with physinif in nf_bridge_info microsoft msrc msrc"},{"id":"CVE-2024-35843","cve":"CVE-2024-35843","title":"iommu/vt-d: Use device rbtree in iopf reporting path","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35843","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35843","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35843","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35843","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35843","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-35843 cve-2024-35843 iommu/vt-d: use device rbtree in iopf reporting path microsoft msrc msrc"},{"id":"CVE-2024-35849","cve":"CVE-2024-35849","title":"btrfs: fix information leak in btrfs_ioctl_logical_to_ino()","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35849","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35849","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35849","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35849","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35849","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-35849 cve-2024-35849 btrfs: fix information leak in btrfs_ioctl_logical_to_ino() microsoft msrc msrc"},{"id":"CVE-2024-35853","cve":"CVE-2024-35853","title":"mlxsw: spectrum_acl_tcam: Fix memory leak during rehash","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35853","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35853","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35853","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.4,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35853","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35853","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-35853 cve-2024-35853 mlxsw: spectrum_acl_tcam: fix memory leak during rehash microsoft msrc msrc"},{"id":"CVE-2024-35854","cve":"CVE-2024-35854","title":"mlxsw: spectrum_acl_tcam: Fix possible use-after-free during rehash","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35854","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35854","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35854","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35854","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35854","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-35854 cve-2024-35854 mlxsw: spectrum_acl_tcam: fix possible use-after-free during rehash microsoft msrc msrc"},{"id":"CVE-2024-35857","cve":"CVE-2024-35857","title":"icmp: prevent possible NULL dereferences from icmp_build_probe()","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35857","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35857","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35857","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.3,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35857","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35857","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-35857 cve-2024-35857 icmp: prevent possible null dereferences from icmp_build_probe() microsoft msrc msrc"},{"id":"CVE-2024-35861","cve":"CVE-2024-35861","title":"smb: client: fix potential UAF in cifs_signal_cifsd_for_reconnect()","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35861","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35861","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35861","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35861","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35861","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-35861 cve-2024-35861 smb: client: fix potential uaf in cifs_signal_cifsd_for_reconnect() microsoft msrc msrc"},{"id":"CVE-2024-35862","cve":"CVE-2024-35862","title":"smb: client: fix potential UAF in smb2_is_network_name_deleted()","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35862","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35862","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35862","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35862","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35862","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-35862 cve-2024-35862 smb: client: fix potential uaf in smb2_is_network_name_deleted() microsoft msrc msrc"},{"id":"CVE-2024-35863","cve":"CVE-2024-35863","title":"smb: client: fix potential UAF in is_valid_oplock_break()","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35863","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35863","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35863","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35863","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35863","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-35863 cve-2024-35863 smb: client: fix potential uaf in is_valid_oplock_break() microsoft msrc msrc"},{"id":"CVE-2024-35864","cve":"CVE-2024-35864","title":"smb: client: fix potential UAF in smb2_is_valid_lease_break()","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35864","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35864","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35864","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35864","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35864","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-35864 cve-2024-35864 smb: client: fix potential uaf in smb2_is_valid_lease_break() microsoft msrc msrc"},{"id":"CVE-2024-35865","cve":"CVE-2024-35865","title":"smb: client: fix potential UAF in smb2_is_valid_oplock_break()","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35865","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35865","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35865","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35865","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35865","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-35865 cve-2024-35865 smb: client: fix potential uaf in smb2_is_valid_oplock_break() microsoft msrc msrc"},{"id":"CVE-2024-35866","cve":"CVE-2024-35866","title":"smb: client: fix potential UAF in cifs_dump_full_key()","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35866","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35866","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35866","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.6,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35866","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35866","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-35866 cve-2024-35866 smb: client: fix potential uaf in cifs_dump_full_key() microsoft msrc msrc"},{"id":"CVE-2024-35867","cve":"CVE-2024-35867","title":"smb: client: fix potential UAF in cifs_stats_proc_show()","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35867","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35867","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35867","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.6,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35867","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35867","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-35867 cve-2024-35867 smb: client: fix potential uaf in cifs_stats_proc_show() microsoft msrc msrc"},{"id":"CVE-2024-35868","cve":"CVE-2024-35868","title":"smb: client: fix potential UAF in cifs_stats_proc_write()","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35868","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35868","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35868","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.6,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35868","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35868","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-35868 cve-2024-35868 smb: client: fix potential uaf in cifs_stats_proc_write() microsoft msrc msrc"},{"id":"CVE-2024-35869","cve":"CVE-2024-35869","title":"smb: client: guarantee refcounted children from parent session","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35869","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35869","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35869","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.4,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35869","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35869","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-35869 cve-2024-35869 smb: client: guarantee refcounted children from parent session microsoft msrc msrc"},{"id":"CVE-2024-35870","cve":"CVE-2024-35870","title":"smb: client: fix UAF in smb2_reconnect_server()","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35870","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35870","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35870","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.4,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35870","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35870","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-35870 cve-2024-35870 smb: client: fix uaf in smb2_reconnect_server() microsoft msrc msrc"},{"id":"CVE-2024-35875","cve":"CVE-2024-35875","title":"x86/coco: Require seeding RNG with RDRAND on CoCo systems","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35875","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35875","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35875","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35875","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35875","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-35875 cve-2024-35875 x86/coco: require seeding rng with rdrand on coco systems microsoft msrc msrc"},{"id":"CVE-2024-35878","cve":"CVE-2024-35878","title":"of: module: prevent NULL pointer dereference in vsnprintf()","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35878","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35878","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35878","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.3,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35878","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35878","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-35878 cve-2024-35878 of: module: prevent null pointer dereference in vsnprintf() microsoft msrc msrc"},{"id":"CVE-2024-35887","cve":"CVE-2024-35887","title":"ax25: fix use-after-free bugs caused by ax25_ds_del_timer","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35887","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35887","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35887","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.7,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35887","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35887","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-35887 cve-2024-35887 ax25: fix use-after-free bugs caused by ax25_ds_del_timer microsoft msrc msrc"},{"id":"CVE-2024-35917","cve":"CVE-2024-35917","title":"s390/bpf: Fix bpf_plt pointer arithmetic","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35917","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35917","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35917","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35917","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35917","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-35917 cve-2024-35917 s390/bpf: fix bpf_plt pointer arithmetic microsoft msrc msrc"},{"id":"CVE-2024-35924","cve":"CVE-2024-35924","title":"usb: typec: ucsi: Limit read size on v1.2","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35924","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35924","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35924","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35924","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35924","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-35924 cve-2024-35924 usb: typec: ucsi: limit read size on v1.2 microsoft msrc msrc"},{"id":"CVE-2024-35929","cve":"CVE-2024-35929","title":"rcu/nocb: Fix WARN_ON_ONCE() in the rcu_nocb_bypass_lock()","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35929","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35929","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35929","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35929","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35929","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-35929 cve-2024-35929 rcu/nocb: fix warn_on_once() in the rcu_nocb_bypass_lock() microsoft msrc msrc"},{"id":"CVE-2024-35931","cve":"CVE-2024-35931","title":"drm/amdgpu: Skip do PCI error slot reset during RAS recovery","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35931","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35931","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35931","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35931","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35931","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-35931 cve-2024-35931 drm/amdgpu: skip do pci error slot reset during ras recovery microsoft msrc msrc"},{"id":"CVE-2024-35932","cve":"CVE-2024-35932","title":"drm/vc4: don't check if plane-&gt;state-&gt;fb == state-&gt;fb","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35932","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35932","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35932","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35932","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35932","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-35932 cve-2024-35932 drm/vc4: don't check if plane-&gt;state-&gt;fb == state-&gt;fb microsoft msrc msrc"},{"id":"CVE-2024-35939","cve":"CVE-2024-35939","title":"dma-direct: Leak pages on dma_set_decrypted() failure","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35939","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35939","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35939","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35939","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35939","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-35939 cve-2024-35939 dma-direct: leak pages on dma_set_decrypted() failure microsoft msrc msrc"},{"id":"CVE-2024-35949","cve":"CVE-2024-35949","title":"btrfs: make sure that WRITTEN is set on all metadata blocks","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35949","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35949","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35949","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35949","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35949","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-35949 cve-2024-35949 btrfs: make sure that written is set on all metadata blocks microsoft msrc msrc"},{"id":"CVE-2024-35951","cve":"CVE-2024-35951","title":"drm/panfrost: Fix the error path in panfrost_mmu_map_fault_addr()","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35951","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35951","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35951","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35951","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35951","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-35951 cve-2024-35951 drm/panfrost: fix the error path in panfrost_mmu_map_fault_addr() microsoft msrc msrc"},{"id":"CVE-2024-35955","cve":"CVE-2024-35955","title":"kprobes: Fix possible use-after-free issue on kprobe registration","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35955","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35955","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35955","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35955","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35955","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-35955 cve-2024-35955 kprobes: fix possible use-after-free issue on kprobe registration microsoft msrc msrc"},{"id":"CVE-2024-35956","cve":"CVE-2024-35956","title":"btrfs: qgroup: fix qgroup prealloc rsv leak in subvolume operations","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35956","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35956","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35956","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35956","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35956","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-35956 cve-2024-35956 btrfs: qgroup: fix qgroup prealloc rsv leak in subvolume operations microsoft msrc msrc"},{"id":"CVE-2024-3596","cve":"CVE-2024-3596","title":"CERT/CC: CVE-2024-3596 RADIUS Protocol Spoofing Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-3596","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-3596","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-3596","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-3596","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-3596","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-3596 cve-2024-3596 cert/cc: cve-2024-3596 radius protocol spoofing vulnerability microsoft msrc msrc"},{"id":"CVE-2024-35965","cve":"CVE-2024-35965","title":"Bluetooth: L2CAP: Fix not validating setsockopt user input","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35965","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35965","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35965","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35965","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35965","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-35965 cve-2024-35965 bluetooth: l2cap: fix not validating setsockopt user input microsoft msrc msrc"},{"id":"CVE-2024-35971","cve":"CVE-2024-35971","title":"net: ks8851: Handle softirqs at the end of IRQ thread to fix hang","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35971","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35971","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35971","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35971","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35971","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-35971 cve-2024-35971 net: ks8851: handle softirqs at the end of irq thread to fix hang microsoft msrc msrc"},{"id":"CVE-2024-35972","cve":"CVE-2024-35972","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35972","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35972","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35972","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35972","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35972","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-35972 cve-2024-35972 mariner microsoft msrc msrc"},{"id":"CVE-2024-35978","cve":"CVE-2024-35978","title":"Bluetooth: Fix memory leak in hci_req_sync_complete()","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35978","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35978","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35978","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35978","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35978","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-35978 cve-2024-35978 bluetooth: fix memory leak in hci_req_sync_complete() microsoft msrc msrc"},{"id":"CVE-2024-35982","cve":"CVE-2024-35982","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35982","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35982","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35982","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35982","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35982","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-35982 cve-2024-35982 mariner microsoft msrc msrc"},{"id":"CVE-2024-35984","cve":"CVE-2024-35984","title":"i2c: smbus: fix NULL function pointer dereference","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35984","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35984","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35984","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35984","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35984","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-35984 cve-2024-35984 i2c: smbus: fix null function pointer dereference microsoft msrc msrc"},{"id":"CVE-2024-35990","cve":"CVE-2024-35990","title":"dma: xilinx_dpdma: Fix locking","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35990","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35990","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35990","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35990","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35990","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-35990 cve-2024-35990 dma: xilinx_dpdma: fix locking microsoft msrc msrc"},{"id":"CVE-2024-35992","cve":"CVE-2024-35992","title":"phy: marvell: a3700-comphy: Fix out of bounds read","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35992","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35992","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35992","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35992","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35992","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-35992 cve-2024-35992 phy: marvell: a3700-comphy: fix out of bounds read microsoft msrc msrc"},{"id":"CVE-2024-35995","cve":"CVE-2024-35995","title":"ACPI: CPPC: Use access_width over bit_width for system memory accesses","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35995","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35995","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35995","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35995","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35995","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-35995 cve-2024-35995 acpi: cppc: use access_width over bit_width for system memory accesses microsoft msrc msrc"},{"id":"CVE-2024-35997","cve":"CVE-2024-35997","title":"HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35997","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35997","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35997","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35997","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35997","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-35997 cve-2024-35997 hid: i2c-hid: remove i2c_hid_read_pending flag to prevent lock-up microsoft msrc msrc"},{"id":"CVE-2024-35999","cve":"CVE-2024-35999","title":"smb3: missing lock when picking channel","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35999","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35999","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35999","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35999","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35999","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-35999 cve-2024-35999 smb3: missing lock when picking channel microsoft msrc msrc"},{"id":"CVE-2024-36000","cve":"CVE-2024-36000","title":"mm/hugetlb: fix missing hugetlb_lock for resv uncharge","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36000","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36000","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36000","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36000","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36000","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-36000 cve-2024-36000 mm/hugetlb: fix missing hugetlb_lock for resv uncharge microsoft msrc msrc"},{"id":"CVE-2024-36008","cve":"CVE-2024-36008","title":"ipv4: check for NULL idev in ip_route_use_hint()","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36008","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36008","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36008","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36008","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36008","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-36008 cve-2024-36008 ipv4: check for null idev in ip_route_use_hint() microsoft msrc msrc"},{"id":"CVE-2024-36009","cve":"CVE-2024-36009","title":"ax25: Fix netdev refcount issue","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36009","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36009","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36009","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36009","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36009","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-36009 cve-2024-36009 ax25: fix netdev refcount issue microsoft msrc msrc"},{"id":"CVE-2024-36012","cve":"CVE-2024-36012","title":"Bluetooth: msft: fix slab-use-after-free in msft_do_close()","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36012","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36012","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36012","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36012","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36012","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-36012 cve-2024-36012 bluetooth: msft: fix slab-use-after-free in msft_do_close() microsoft msrc msrc"},{"id":"CVE-2024-36013","cve":"CVE-2024-36013","title":"Bluetooth: L2CAP: Fix slab-use-after-free in l2cap_connect()","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36013","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36013","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36013","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36013","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36013","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-36013 cve-2024-36013 bluetooth: l2cap: fix slab-use-after-free in l2cap_connect() microsoft msrc msrc"},{"id":"CVE-2024-36021","cve":"CVE-2024-36021","title":"net: hns3: fix kernel crash when devlink reload during pf initialization","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36021","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36021","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36021","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36021","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36021","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-36021 cve-2024-36021 net: hns3: fix kernel crash when devlink reload during pf initialization microsoft msrc msrc"},{"id":"CVE-2024-36023","cve":"CVE-2024-36023","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36023","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36023","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36023","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36023","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36023","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-36023 cve-2024-36023 mariner microsoft msrc msrc"},{"id":"CVE-2024-36024","cve":"CVE-2024-36024","title":"drm/amd/display: Disable idle reallow as part of command/gpint execution","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36024","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36024","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36024","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.1,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36024","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36024","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-36024 cve-2024-36024 drm/amd/display: disable idle reallow as part of command/gpint execution microsoft msrc msrc"},{"id":"CVE-2024-36039","cve":"CVE-2024-36039","title":"PyMySQL through 1.1.0 allows SQL injection if used with untrusted JSON input because keys are not escaped by escape_dict.","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36039","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36039","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36039","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.3,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36039","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36039","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-36039 cve-2024-36039 pymysql through 1.1.0 allows sql injection if used with untrusted json input because keys are not escaped by escape_dict. microsoft msrc msrc"},{"id":"CVE-2024-36387","cve":"CVE-2024-36387","title":"Apache HTTP Server: DoS by Null pointer in websocket over HTTP/2","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36387","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36387","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36387","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.4,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36387","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36387","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-36387 cve-2024-36387 apache http server: dos by null pointer in websocket over http/2 microsoft msrc msrc"},{"id":"CVE-2024-3651","cve":"CVE-2024-3651","title":"Denial of Service via Quadratic Complexity in kjd/idna","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-3651","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-3651","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-3651","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-3651","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-3651","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-3651 cve-2024-3651 denial of service via quadratic complexity in kjd/idna microsoft msrc msrc"},{"id":"CVE-2024-36891","cve":"CVE-2024-36891","title":"maple_tree: fix mas_empty_area_rev() null pointer dereference","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36891","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36891","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36891","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36891","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36891","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-36891 cve-2024-36891 maple_tree: fix mas_empty_area_rev() null pointer dereference microsoft msrc msrc"},{"id":"CVE-2024-36893","cve":"CVE-2024-36893","title":"usb: typec: tcpm: Check for port partner validity before consuming it","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36893","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36893","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36893","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36893","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36893","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-36893 cve-2024-36893 usb: typec: tcpm: check for port partner validity before consuming it microsoft msrc msrc"},{"id":"CVE-2024-36897","cve":"CVE-2024-36897","title":"drm/amd/display: Atom Integrated System Info v2_2 for DCN35","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36897","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36897","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36897","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36897","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36897","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-36897 cve-2024-36897 drm/amd/display: atom integrated system info v2_2 for dcn35 microsoft msrc msrc"},{"id":"CVE-2024-36898","cve":"CVE-2024-36898","title":"gpiolib: cdev: fix uninitialised kfifo","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36898","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36898","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36898","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36898","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36898","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-36898 cve-2024-36898 gpiolib: cdev: fix uninitialised kfifo microsoft msrc msrc"},{"id":"CVE-2024-36899","cve":"CVE-2024-36899","title":"gpiolib: cdev: Fix use after free in lineinfo_changed_notify","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36899","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36899","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36899","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36899","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36899","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-36899 cve-2024-36899 gpiolib: cdev: fix use after free in lineinfo_changed_notify microsoft msrc msrc"},{"id":"CVE-2024-36900","cve":"CVE-2024-36900","title":"net: hns3: fix kernel crash when devlink reload during initialization","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36900","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36900","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36900","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36900","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36900","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-36900 cve-2024-36900 net: hns3: fix kernel crash when devlink reload during initialization microsoft msrc msrc"},{"id":"CVE-2024-36901","cve":"CVE-2024-36901","title":"ipv6: prevent NULL dereference in ip6_output()","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36901","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36901","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36901","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36901","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36901","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-36901 cve-2024-36901 ipv6: prevent null dereference in ip6_output() microsoft msrc msrc"},{"id":"CVE-2024-36902","cve":"CVE-2024-36902","title":"ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action()","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36902","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36902","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36902","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36902","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36902","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-36902 cve-2024-36902 ipv6: fib6_rules: avoid possible null dereference in fib6_rule_action() microsoft msrc msrc"},{"id":"CVE-2024-36909","cve":"CVE-2024-36909","title":"Drivers: hv: vmbus: Don't free ring buffers that couldn't be re-encrypted","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36909","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36909","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36909","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36909","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36909","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-36909 cve-2024-36909 drivers: hv: vmbus: don't free ring buffers that couldn't be re-encrypted microsoft msrc msrc"},{"id":"CVE-2024-36910","cve":"CVE-2024-36910","title":"uio_hv_generic: Don't free decrypted memory","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36910","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36910","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36910","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.2,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36910","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36910","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-36910 cve-2024-36910 uio_hv_generic: don't free decrypted memory microsoft msrc msrc"},{"id":"CVE-2024-36911","cve":"CVE-2024-36911","title":"hv_netvsc: Don't free decrypted memory","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36911","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36911","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36911","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36911","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36911","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-36911 cve-2024-36911 hv_netvsc: don't free decrypted memory microsoft msrc msrc"},{"id":"CVE-2024-36912","cve":"CVE-2024-36912","title":"Drivers: hv: vmbus: Track decrypted status in vmbus_gpadl","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36912","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36912","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36912","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.1,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36912","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36912","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-36912 cve-2024-36912 drivers: hv: vmbus: track decrypted status in vmbus_gpadl microsoft msrc msrc"},{"id":"CVE-2024-36913","cve":"CVE-2024-36913","title":"Drivers: hv: vmbus: Leak pages if set_memory_encrypted() fails","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36913","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36913","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36913","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.1,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36913","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36913","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-36913 cve-2024-36913 drivers: hv: vmbus: leak pages if set_memory_encrypted() fails microsoft msrc msrc"},{"id":"CVE-2024-36914","cve":"CVE-2024-36914","title":"drm/amd/display: Skip on writeback when it's not applicable","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36914","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36914","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36914","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36914","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36914","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-36914 cve-2024-36914 drm/amd/display: skip on writeback when it's not applicable microsoft msrc msrc"},{"id":"CVE-2024-36915","cve":"CVE-2024-36915","title":"nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36915","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36915","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36915","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36915","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36915","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-36915 cve-2024-36915 nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies microsoft msrc msrc"},{"id":"CVE-2024-36917","cve":"CVE-2024-36917","title":"block: fix overflow in blk_ioctl_discard()","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36917","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36917","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36917","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36917","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36917","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-36917 cve-2024-36917 block: fix overflow in blk_ioctl_discard() microsoft msrc msrc"},{"id":"CVE-2024-36920","cve":"CVE-2024-36920","title":"scsi: mpi3mr: Avoid memcpy field-spanning write WARNING","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36920","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36920","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36920","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":3.3,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36920","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36920","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2024-36920 cve-2024-36920 scsi: mpi3mr: avoid memcpy field-spanning write warning microsoft msrc msrc"},{"id":"CVE-2024-36921","cve":"CVE-2024-36921","title":"wifi: iwlwifi: mvm: guard against invalid STA ID on removal","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36921","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36921","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36921","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36921","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36921","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-36921 cve-2024-36921 wifi: iwlwifi: mvm: guard against invalid sta id on removal microsoft msrc msrc"},{"id":"CVE-2024-36922","cve":"CVE-2024-36922","title":"wifi: iwlwifi: read txq-&gt;read_ptr under lock","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36922","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36922","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36922","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.1,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36922","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36922","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-36922 cve-2024-36922 wifi: iwlwifi: read txq-&gt;read_ptr under lock microsoft msrc msrc"},{"id":"CVE-2024-36924","cve":"CVE-2024-36924","title":"scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up()","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36924","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36924","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36924","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36924","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36924","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-36924 cve-2024-36924 scsi: lpfc: release hbalock before calling lpfc_worker_wake_up() microsoft msrc msrc"},{"id":"CVE-2024-36925","cve":"CVE-2024-36925","title":"swiotlb: initialise restricted pool list_head when SWIOTLB_DYNAMIC=y","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36925","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36925","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36925","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36925","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36925","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-36925 cve-2024-36925 swiotlb: initialise restricted pool list_head when swiotlb_dynamic=y microsoft msrc msrc"},{"id":"CVE-2024-36926","cve":"CVE-2024-36926","title":"powerpc/pseries/iommu: LPAR panics during boot up with a frozen PE","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36926","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36926","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36926","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36926","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36926","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-36926 cve-2024-36926 powerpc/pseries/iommu: lpar panics during boot up with a frozen pe microsoft msrc msrc"},{"id":"CVE-2024-36930","cve":"CVE-2024-36930","title":"spi: fix null pointer dereference within spi_sync","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36930","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36930","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36930","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36930","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36930","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-36930 cve-2024-36930 spi: fix null pointer dereference within spi_sync microsoft msrc msrc"},{"id":"CVE-2024-36938","cve":"CVE-2024-36938","title":"bpf skmsg: Fix NULL pointer dereference in sk_psock_skb_ingress_enqueue","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36938","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36938","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36938","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36938","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36938","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-36938 cve-2024-36938 bpf skmsg: fix null pointer dereference in sk_psock_skb_ingress_enqueue microsoft msrc msrc"},{"id":"CVE-2024-36949","cve":"CVE-2024-36949","title":"amd/amdkfd: sync all devices to wait all processes being evicted","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36949","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36949","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36949","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.7,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36949","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36949","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-36949 cve-2024-36949 amd/amdkfd: sync all devices to wait all processes being evicted microsoft msrc msrc"},{"id":"CVE-2024-36951","cve":"CVE-2024-36951","title":"drm/amdkfd: range check cp bad op exception interrupts","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36951","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36951","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36951","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36951","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36951","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-36951 cve-2024-36951 drm/amdkfd: range check cp bad op exception interrupts microsoft msrc msrc"},{"id":"CVE-2024-36965","cve":"CVE-2024-36965","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36965","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36965","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36965","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36965","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36965","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-36965 cve-2024-36965 mariner microsoft msrc msrc"},{"id":"CVE-2024-36967","cve":"CVE-2024-36967","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36967","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36967","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36967","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36967","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36967","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-36967 cve-2024-36967 mariner microsoft msrc msrc"},{"id":"CVE-2024-36968","cve":"CVE-2024-36968","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36968","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36968","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36968","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36968","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36968","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-36968 cve-2024-36968 mariner microsoft msrc msrc"},{"id":"CVE-2024-36969","cve":"CVE-2024-36969","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36969","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36969","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36969","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36969","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36969","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-36969 cve-2024-36969 mariner microsoft msrc msrc"},{"id":"CVE-2024-3727","cve":"CVE-2024-3727","title":"Containers/image: digest type does not guarantee valid type","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-3727","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-3727","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-3727","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.3,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-3727","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-3727","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-3727 cve-2024-3727 containers/image: digest type does not guarantee valid type microsoft msrc msrc"},{"id":"CVE-2024-37298","cve":"CVE-2024-37298","title":"Potential memory exhaustion attack due to sparse slice deserialization","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37298","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37298","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37298","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37298","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37298","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-37298 cve-2024-37298 potential memory exhaustion attack due to sparse slice deserialization microsoft msrc msrc"},{"id":"CVE-2024-37318","cve":"CVE-2024-37318","title":"SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37318","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37318","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37318","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37318","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37318","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-37318 cve-2024-37318 sql server native client ole db provider remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-37319","cve":"CVE-2024-37319","title":"SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37319","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37319","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37319","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37319","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37319","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-37319 cve-2024-37319 sql server native client ole db provider remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-37320","cve":"CVE-2024-37320","title":"SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37320","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37320","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37320","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37320","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37320","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-37320 cve-2024-37320 sql server native client ole db provider remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-37321","cve":"CVE-2024-37321","title":"SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37321","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37321","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37321","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37321","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37321","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-37321 cve-2024-37321 sql server native client ole db provider remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-37322","cve":"CVE-2024-37322","title":"SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37322","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37322","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37322","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37322","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37322","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-37322 cve-2024-37322 sql server native client ole db provider remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-37323","cve":"CVE-2024-37323","title":"SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37323","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37323","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37323","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37323","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37323","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-37323 cve-2024-37323 sql server native client ole db provider remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-37324","cve":"CVE-2024-37324","title":"SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37324","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37324","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37324","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37324","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37324","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-37324 cve-2024-37324 sql server native client ole db provider remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-37326","cve":"CVE-2024-37326","title":"SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37326","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37326","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37326","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37326","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37326","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-37326 cve-2024-37326 sql server native client ole db provider remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-37327","cve":"CVE-2024-37327","title":"SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37327","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37327","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37327","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37327","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37327","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-37327 cve-2024-37327 sql server native client ole db provider remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-37328","cve":"CVE-2024-37328","title":"SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37328","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37328","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37328","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37328","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37328","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-37328 cve-2024-37328 sql server native client ole db provider remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-37329","cve":"CVE-2024-37329","title":"SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37329","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37329","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37329","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37329","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37329","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-37329 cve-2024-37329 sql server native client ole db provider remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-37330","cve":"CVE-2024-37330","title":"SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37330","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37330","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37330","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37330","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37330","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-37330 cve-2024-37330 sql server native client ole db provider remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-37331","cve":"CVE-2024-37331","title":"SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37331","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37331","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37331","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37331","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37331","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-37331 cve-2024-37331 sql server native client ole db provider remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-37332","cve":"CVE-2024-37332","title":"SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37332","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37332","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37332","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37332","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37332","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-37332 cve-2024-37332 sql server native client ole db provider remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-37333","cve":"CVE-2024-37333","title":"SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37333","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37333","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37333","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37333","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37333","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-37333 cve-2024-37333 sql server native client ole db provider remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-37334","cve":"CVE-2024-37334","title":"Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37334","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37334","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37334","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37334","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37334","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-37334 cve-2024-37334 microsoft ole db driver for sql server remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-37335","cve":"CVE-2024-37335","title":"Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37335","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37335","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37335","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37335","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37335","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-37335 cve-2024-37335 microsoft sql server native scoring remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-37336","cve":"CVE-2024-37336","title":"SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37336","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37336","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37336","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37336","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37336","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-37336 cve-2024-37336 sql server native client ole db provider remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-37337","cve":"CVE-2024-37337","title":"Microsoft SQL Server Native Scoring Information Disclosure Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37337","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37337","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37337","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37337","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37337","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-37337 cve-2024-37337 microsoft sql server native scoring information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2024-37338","cve":"CVE-2024-37338","title":"Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37338","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37338","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37338","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37338","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37338","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-37338 cve-2024-37338 microsoft sql server native scoring remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-37339","cve":"CVE-2024-37339","title":"Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37339","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37339","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37339","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37339","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37339","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-37339 cve-2024-37339 microsoft sql server native scoring remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-37340","cve":"CVE-2024-37340","title":"Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37340","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37340","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37340","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37340","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37340","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-37340 cve-2024-37340 microsoft sql server native scoring remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-37341","cve":"CVE-2024-37341","title":"Microsoft SQL Server Elevation of Privilege Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37341","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37341","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37341","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37341","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37341","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-37341 cve-2024-37341 microsoft sql server elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-37342","cve":"CVE-2024-37342","title":"Microsoft SQL Server Native Scoring Information Disclosure Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37342","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37342","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37342","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37342","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37342","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-37342 cve-2024-37342 microsoft sql server native scoring information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2024-37370","cve":"CVE-2024-37370","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37370","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37370","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37370","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37370","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37370","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-37370 cve-2024-37370 mariner microsoft msrc msrc"},{"id":"CVE-2024-37371","cve":"CVE-2024-37371","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37371","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37371","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37371","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.1,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37371","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37371","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2024-37371 cve-2024-37371 mariner microsoft msrc msrc"},{"id":"CVE-2024-37407","cve":"CVE-2024-37407","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37407","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37407","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37407","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.1,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37407","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37407","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2024-37407 cve-2024-37407 mariner microsoft msrc msrc"},{"id":"CVE-2024-37890","cve":"CVE-2024-37890","title":"Mariner","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37890","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37890","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37890","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37890","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37890","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-37890 cve-2024-37890 mariner microsoft msrc msrc"},{"id":"CVE-2024-37965","cve":"CVE-2024-37965","title":"Microsoft SQL Server Elevation of Privilege Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37965","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37965","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37965","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37965","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37965","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-37965 cve-2024-37965 microsoft sql server elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-37966","cve":"CVE-2024-37966","title":"Microsoft SQL Server Native Scoring Information Disclosure Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37966","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37966","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37966","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37966","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37966","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-37966 cve-2024-37966 microsoft sql server native scoring information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2024-37969","cve":"CVE-2024-37969","title":"Secure Boot Security Feature Bypass Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37969","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37969","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37969","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37969","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37969","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-37969 cve-2024-37969 secure boot security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2024-37970","cve":"CVE-2024-37970","title":"Secure Boot Security Feature Bypass Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37970","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37970","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37970","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37970","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37970","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-37970 cve-2024-37970 secure boot security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2024-37971","cve":"CVE-2024-37971","title":"Secure Boot Security Feature Bypass Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37971","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37971","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37971","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37971","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37971","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-37971 cve-2024-37971 secure boot security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2024-37972","cve":"CVE-2024-37972","title":"Secure Boot Security Feature Bypass Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37972","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37972","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37972","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37972","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37972","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-37972 cve-2024-37972 secure boot security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2024-37973","cve":"CVE-2024-37973","title":"Secure Boot Security Feature Bypass Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37973","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37973","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37973","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37973","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37973","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-37973 cve-2024-37973 secure boot security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2024-37974","cve":"CVE-2024-37974","title":"Secure Boot Security Feature Bypass Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37974","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37974","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37974","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37974","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37974","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-37974 cve-2024-37974 secure boot security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2024-37975","cve":"CVE-2024-37975","title":"Secure Boot Security Feature Bypass Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37975","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37975","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37975","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37975","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37975","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-37975 cve-2024-37975 secure boot security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2024-37977","cve":"CVE-2024-37977","title":"Secure Boot Security Feature Bypass Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37977","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37977","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37977","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37977","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37977","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-37977 cve-2024-37977 secure boot security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2024-37978","cve":"CVE-2024-37978","title":"Secure Boot Security Feature Bypass Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37978","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37978","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37978","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37978","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37978","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-37978 cve-2024-37978 secure boot security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2024-37980","cve":"CVE-2024-37980","title":"Microsoft SQL Server Elevation of Privilege Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37980","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37980","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37980","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37980","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37980","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-37980 cve-2024-37980 microsoft sql server elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-37981","cve":"CVE-2024-37981","title":"Secure Boot Security Feature Bypass Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37981","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37981","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37981","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37981","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37981","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-37981 cve-2024-37981 secure boot security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2024-37984","cve":"CVE-2024-37984","title":"Secure Boot Security Feature Bypass Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37984","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37984","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37984","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.4,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37984","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37984","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-37984 cve-2024-37984 secure boot security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2024-37985","cve":"CVE-2024-37985","title":"Windows Kernel Information Disclosure Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37985","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37985","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37985","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.9,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37985","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37985","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-37985 cve-2024-37985 windows kernel information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2024-37986","cve":"CVE-2024-37986","title":"Secure Boot Security Feature Bypass Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37986","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37986","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37986","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37986","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37986","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-37986 cve-2024-37986 secure boot security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2024-37987","cve":"CVE-2024-37987","title":"Secure Boot Security Feature Bypass Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37987","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37987","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37987","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37987","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37987","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-37987 cve-2024-37987 secure boot security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2024-37988","cve":"CVE-2024-37988","title":"Secure Boot Security Feature Bypass Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37988","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37988","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37988","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37988","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37988","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-37988 cve-2024-37988 secure boot security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2024-37989","cve":"CVE-2024-37989","title":"Secure Boot Security Feature Bypass Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37989","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37989","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37989","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37989","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37989","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-37989 cve-2024-37989 secure boot security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38010","cve":"CVE-2024-38010","title":"Secure Boot Security Feature Bypass Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38010","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38010","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38010","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38010","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38010","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38010 cve-2024-38010 secure boot security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38011","cve":"CVE-2024-38011","title":"Secure Boot Security Feature Bypass Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38011","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38011","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38011","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38011","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38011","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38011 cve-2024-38011 secure boot security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38013","cve":"CVE-2024-38013","title":"Microsoft Windows Server Backup Elevation of Privilege Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38013","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38013","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38013","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.7,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38013","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38013","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-38013 cve-2024-38013 microsoft windows server backup elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38014","cve":"CVE-2024-38014","title":"Windows Installer Elevation of Privilege Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38014","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38014","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38014","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38014","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38014","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38014 cve-2024-38014 windows installer elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38015","cve":"CVE-2024-38015","title":"Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38015","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38015","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38015","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38015","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38015","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38015 cve-2024-38015 windows remote desktop gateway (rd gateway) denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38016","cve":"CVE-2024-38016","title":"Microsoft Office Visio Remote Code Execution Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38016","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38016","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38016","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38016","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38016","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38016 cve-2024-38016 microsoft office visio remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38017","cve":"CVE-2024-38017","title":"Microsoft Message Queuing Information Disclosure Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38017","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38017","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38017","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38017","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38017","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-38017 cve-2024-38017 microsoft message queuing information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38018","cve":"CVE-2024-38018","title":"Microsoft SharePoint Server Remote Code Execution Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38018","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38018","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38018","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38018","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38018","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38018 cve-2024-38018 microsoft sharepoint server remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38019","cve":"CVE-2024-38019","title":"Microsoft Windows Performance Data Helper Library Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38019","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38019","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38019","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.2,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38019","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38019","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38019 cve-2024-38019 microsoft windows performance data helper library remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38020","cve":"CVE-2024-38020","title":"Microsoft Outlook Spoofing Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38020","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38020","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38020","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38020","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38020","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-38020 cve-2024-38020 microsoft outlook spoofing vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38021","cve":"CVE-2024-38021","title":"Microsoft Outlook Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38021","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38021","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38021","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38021","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38021","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38021 cve-2024-38021 microsoft outlook remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38022","cve":"CVE-2024-38022","title":"Windows Image Acquisition Elevation of Privilege Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38022","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38022","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38022","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38022","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38022","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38022 cve-2024-38022 windows image acquisition elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38023","cve":"CVE-2024-38023","title":"Microsoft SharePoint Server Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38023","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38023","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38023","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.2,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38023","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38023","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38023 cve-2024-38023 microsoft sharepoint server remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38024","cve":"CVE-2024-38024","title":"Microsoft SharePoint Server Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38024","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38024","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38024","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.2,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38024","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38024","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38024 cve-2024-38024 microsoft sharepoint server remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38025","cve":"CVE-2024-38025","title":"Microsoft Windows Performance Data Helper Library Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38025","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38025","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38025","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.2,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38025","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38025","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38025 cve-2024-38025 microsoft windows performance data helper library remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38027","cve":"CVE-2024-38027","title":"Windows Line Printer Daemon Service Denial of Service Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38027","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38027","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38027","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38027","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38027","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-38027 cve-2024-38027 windows line printer daemon service denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38028","cve":"CVE-2024-38028","title":"Microsoft Windows Performance Data Helper Library Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38028","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38028","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38028","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.2,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38028","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38028","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38028 cve-2024-38028 microsoft windows performance data helper library remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38030","cve":"CVE-2024-38030","title":"Windows Themes Spoofing Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38030","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38030","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38030","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38030","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38030","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-38030 cve-2024-38030 windows themes spoofing vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38031","cve":"CVE-2024-38031","title":"Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38031","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38031","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38031","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38031","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38031","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38031 cve-2024-38031 windows online certificate status protocol (ocsp) server denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38032","cve":"CVE-2024-38032","title":"Microsoft Xbox Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38032","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38032","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38032","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38032","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38032","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38032 cve-2024-38032 microsoft xbox remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38033","cve":"CVE-2024-38033","title":"PowerShell Elevation of Privilege Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38033","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38033","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38033","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.3,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38033","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38033","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38033 cve-2024-38033 powershell elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38034","cve":"CVE-2024-38034","title":"Windows Filtering Platform Elevation of Privilege Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38034","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38034","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38034","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38034","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38034","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38034 cve-2024-38034 windows filtering platform elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38041","cve":"CVE-2024-38041","title":"Windows Kernel Information Disclosure Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38041","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38041","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38041","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38041","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38041","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-38041 cve-2024-38041 windows kernel information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38043","cve":"CVE-2024-38043","title":"PowerShell Elevation of Privilege Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38043","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38043","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38043","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38043","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38043","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38043 cve-2024-38043 powershell elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38044","cve":"CVE-2024-38044","title":"DHCP Server Service Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38044","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38044","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38044","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.2,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38044","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38044","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38044 cve-2024-38044 dhcp server service remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38045","cve":"CVE-2024-38045","title":"Windows TCP/IP Remote Code Execution Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38045","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38045","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38045","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.1,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38045","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38045","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38045 cve-2024-38045 windows tcp/ip remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38046","cve":"CVE-2024-38046","title":"PowerShell Elevation of Privilege Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38046","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38046","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38046","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38046","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38046","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38046 cve-2024-38046 powershell elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38047","cve":"CVE-2024-38047","title":"PowerShell Elevation of Privilege Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38047","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38047","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38047","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38047","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38047","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38047 cve-2024-38047 powershell elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38048","cve":"CVE-2024-38048","title":"Windows Network Driver Interface Specification (NDIS) Denial of Service Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38048","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38048","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38048","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38048","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38048","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-38048 cve-2024-38048 windows network driver interface specification (ndis) denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38049","cve":"CVE-2024-38049","title":"Windows Distributed Transaction Coordinator Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38049","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38049","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38049","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.6,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38049","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38049","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-38049 cve-2024-38049 windows distributed transaction coordinator remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38050","cve":"CVE-2024-38050","title":"Windows Workstation Service Elevation of Privilege Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38050","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38050","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38050","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38050","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38050","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38050 cve-2024-38050 windows workstation service elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38051","cve":"CVE-2024-38051","title":"Windows Graphics Component Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38051","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38051","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38051","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38051","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38051","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38051 cve-2024-38051 windows graphics component remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38052","cve":"CVE-2024-38052","title":"Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38052","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38052","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38052","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38052","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38052","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38052 cve-2024-38052 kernel streaming wow thunk service driver elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38053","cve":"CVE-2024-38053","title":"Windows Layer-2 Bridge Network Driver Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38053","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38053","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38053","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38053","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38053","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38053 cve-2024-38053 windows layer-2 bridge network driver remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38054","cve":"CVE-2024-38054","title":"Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38054","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38054","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38054","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38054","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38054","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38054 cve-2024-38054 kernel streaming wow thunk service driver elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38055","cve":"CVE-2024-38055","title":"Microsoft Windows Codecs Library Information Disclosure Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38055","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38055","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38055","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38055","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38055","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-38055 cve-2024-38055 microsoft windows codecs library information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38056","cve":"CVE-2024-38056","title":"Microsoft Windows Codecs Library Information Disclosure Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38056","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38056","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38056","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38056","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38056","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-38056 cve-2024-38056 microsoft windows codecs library information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38057","cve":"CVE-2024-38057","title":"Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38057","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38057","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38057","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38057","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38057","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38057 cve-2024-38057 kernel streaming wow thunk service driver elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38058","cve":"CVE-2024-38058","title":"BitLocker Security Feature Bypass Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38058","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38058","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38058","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38058","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38058","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-38058 cve-2024-38058 bitlocker security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38059","cve":"CVE-2024-38059","title":"Win32k Elevation of Privilege Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38059","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38059","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38059","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38059","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38059","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38059 cve-2024-38059 win32k elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38060","cve":"CVE-2024-38060","title":"Windows Imaging Component Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38060","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38060","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38060","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38060","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38060","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38060 cve-2024-38060 windows imaging component remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38061","cve":"CVE-2024-38061","title":"DCOM Remote Cross-Session Activation Elevation of Privilege Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38061","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38061","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38061","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38061","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38061","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38061 cve-2024-38061 dcom remote cross-session activation elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38062","cve":"CVE-2024-38062","title":"Windows Kernel-Mode Driver Elevation of Privilege Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38062","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38062","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38062","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38062","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38062","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38062 cve-2024-38062 windows kernel-mode driver elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38064","cve":"CVE-2024-38064","title":"Windows TCP/IP Information Disclosure Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38064","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38064","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38064","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38064","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38064","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38064 cve-2024-38064 windows tcp/ip information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38065","cve":"CVE-2024-38065","title":"Secure Boot Security Feature Bypass Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38065","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38065","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38065","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38065","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38065","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-38065 cve-2024-38065 secure boot security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38066","cve":"CVE-2024-38066","title":"Windows Win32k Elevation of Privilege Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38066","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38066","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38066","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38066","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38066","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38066 cve-2024-38066 windows win32k elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38067","cve":"CVE-2024-38067","title":"Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38067","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38067","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38067","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38067","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38067","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38067 cve-2024-38067 windows online certificate status protocol (ocsp) server denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38068","cve":"CVE-2024-38068","title":"Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38068","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38068","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38068","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38068","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38068","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38068 cve-2024-38068 windows online certificate status protocol (ocsp) server denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38069","cve":"CVE-2024-38069","title":"Windows Enroll Engine Security Feature Bypass Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38069","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38069","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38069","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38069","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38069","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38069 cve-2024-38069 windows enroll engine security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38070","cve":"CVE-2024-38070","title":"Windows LockDown Policy (WLDP) Security Feature Bypass Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38070","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38070","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38070","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38070","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38070","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38070 cve-2024-38070 windows lockdown policy (wldp) security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38071","cve":"CVE-2024-38071","title":"Windows Remote Desktop Licensing Service Denial of Service Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38071","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38071","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38071","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38071","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38071","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38071 cve-2024-38071 windows remote desktop licensing service denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38072","cve":"CVE-2024-38072","title":"Windows Remote Desktop Licensing Service Denial of Service Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38072","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38072","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38072","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38072","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38072","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38072 cve-2024-38072 windows remote desktop licensing service denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38073","cve":"CVE-2024-38073","title":"Windows Remote Desktop Licensing Service Denial of Service Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38073","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38073","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38073","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38073","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38073","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38073 cve-2024-38073 windows remote desktop licensing service denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38074","cve":"CVE-2024-38074","title":"Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38074","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38074","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38074","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38074","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38074","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2024-38074 cve-2024-38074 windows remote desktop licensing service remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38076","cve":"CVE-2024-38076","title":"Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38076","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38076","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38076","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38076","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38076","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2024-38076 cve-2024-38076 windows remote desktop licensing service remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38077","cve":"CVE-2024-38077","title":"Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38077","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38077","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38077","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38077","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38077","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2024-38077 cve-2024-38077 windows remote desktop licensing service remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38078","cve":"CVE-2024-38078","title":"Xbox Wireless Adapter Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38078","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38078","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38078","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38078","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38078","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38078 cve-2024-38078 xbox wireless adapter remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38079","cve":"CVE-2024-38079","title":"Windows Graphics Component Elevation of Privilege Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38079","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38079","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38079","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38079","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38079","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38079 cve-2024-38079 windows graphics component elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38080","cve":"CVE-2024-38080","title":"Windows Hyper-V Elevation of Privilege Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38080","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38080","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38080","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38080","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38080","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38080 cve-2024-38080 windows hyper-v elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38081","cve":"CVE-2024-38081","title":".NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38081","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38081","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38081","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.3,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38081","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38081","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38081 cve-2024-38081 .net, .net framework, and visual studio elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38085","cve":"CVE-2024-38085","title":"Windows Graphics Component Elevation of Privilege Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38085","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38085","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38085","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38085","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38085","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38085 cve-2024-38085 windows graphics component elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38086","cve":"CVE-2024-38086","title":"Azure Kinect SDK Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38086","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38086","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38086","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.4,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38086","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38086","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-38086 cve-2024-38086 azure kinect sdk remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38087","cve":"CVE-2024-38087","title":"SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38087","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38087","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38087","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38087","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38087","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38087 cve-2024-38087 sql server native client ole db provider remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38088","cve":"CVE-2024-38088","title":"SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38088","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38088","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38088","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38088","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38088","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38088 cve-2024-38088 sql server native client ole db provider remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38089","cve":"CVE-2024-38089","title":"Microsoft Defender for IoT Elevation of Privilege Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38089","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38089","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38089","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.1,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38089","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38089","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2024-38089 cve-2024-38089 microsoft defender for iot elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38091","cve":"CVE-2024-38091","title":"Microsoft WS-Discovery Denial of Service Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38091","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38091","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38091","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38091","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38091","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38091 cve-2024-38091 microsoft ws-discovery denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38092","cve":"CVE-2024-38092","title":"Azure CycleCloud Elevation of Privilege Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38092","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38092","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38092","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38092","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38092","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38092 cve-2024-38092 azure cyclecloud elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38094","cve":"CVE-2024-38094","title":"Microsoft SharePoint Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38094","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38094","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38094","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.2,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38094","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38094","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38094 cve-2024-38094 microsoft sharepoint remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38095","cve":"CVE-2024-38095","title":".NET and Visual Studio Denial of Service Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38095","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38095","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38095","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38095","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38095","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38095 cve-2024-38095 .net and visual studio denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38099","cve":"CVE-2024-38099","title":"Windows Remote Desktop Licensing Service Denial of Service Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38099","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38099","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38099","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.9,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38099","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38099","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-38099 cve-2024-38099 windows remote desktop licensing service denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38100","cve":"CVE-2024-38100","title":"Windows File Explorer Elevation of Privilege Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38100","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38100","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38100","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38100","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38100","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38100 cve-2024-38100 windows file explorer elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38101","cve":"CVE-2024-38101","title":"Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38101","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38101","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38101","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38101","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38101","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-38101 cve-2024-38101 windows layer-2 bridge network driver denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38102","cve":"CVE-2024-38102","title":"Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38102","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38102","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38102","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38102","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38102","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-38102 cve-2024-38102 windows layer-2 bridge network driver denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38103","cve":"CVE-2024-38103","title":"Microsoft Edge (Chromium-based) Information Disclosure Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38103","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38103","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38103","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.9,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38103","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38103","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-38103 cve-2024-38103 microsoft edge (chromium-based) information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38104","cve":"CVE-2024-38104","title":"Windows Fax Service Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38104","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38104","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38104","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38104","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38104","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38104 cve-2024-38104 windows fax service remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38105","cve":"CVE-2024-38105","title":"Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38105","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38105","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38105","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38105","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38105","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-38105 cve-2024-38105 windows layer-2 bridge network driver denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38112","cve":"CVE-2024-38112","title":"Windows MSHTML Platform Spoofing Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38112","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38112","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38112","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38112","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38112","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38112 cve-2024-38112 windows mshtml platform spoofing vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38119","cve":"CVE-2024-38119","title":"Windows Network Address Translation (NAT) Remote Code Execution Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38119","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38119","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38119","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38119","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38119","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38119 cve-2024-38119 windows network address translation (nat) remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38156","cve":"CVE-2024-38156","title":"Microsoft Edge (Chromium-based) Spoofing Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38156","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38156","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38156","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.1,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38156","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38156","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-38156 cve-2024-38156 microsoft edge (chromium-based) spoofing vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38164","cve":"CVE-2024-38164","title":"GroupMe Elevation of Privilege Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38164","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38164","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38164","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.6,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38164","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38164","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2024-38164 cve-2024-38164 groupme elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38176","cve":"CVE-2024-38176","title":"GroupMe Elevation of Privilege Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38176","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38176","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38176","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.1,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38176","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38176","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38176 cve-2024-38176 groupme elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38182","cve":"CVE-2024-38182","title":"Microsoft Dynamics 365 Elevation of Privilege Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38182","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38182","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38182","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38182","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38182","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2024-38182 cve-2024-38182 microsoft dynamics 365 elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38183","cve":"CVE-2024-38183","title":"GroupMe Elevation of Privilege Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38183","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38183","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38183","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38183","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38183","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2024-38183 cve-2024-38183 groupme elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38188","cve":"CVE-2024-38188","title":"Azure Network Watcher VM Agent Elevation of Privilege Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38188","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38188","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38188","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38188","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38188","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38188 cve-2024-38188 azure network watcher vm agent elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38194","cve":"CVE-2024-38194","title":"Azure Web Apps Elevation of Privilege Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38194","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38194","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38194","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.4,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38194","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38194","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38194 cve-2024-38194 azure web apps elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38216","cve":"CVE-2024-38216","title":"Azure Stack Hub Elevation of Privilege Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38216","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38216","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38216","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.2,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38216","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38216","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38216 cve-2024-38216 azure stack hub elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38217","cve":"CVE-2024-38217","title":"Windows Mark of the Web Security Feature Bypass Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38217","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38217","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38217","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.4,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38217","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38217","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-38217 cve-2024-38217 windows mark of the web security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38220","cve":"CVE-2024-38220","title":"Azure Stack Hub Elevation of Privilege Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38220","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38220","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38220","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38220","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38220","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2024-38220 cve-2024-38220 azure stack hub elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38221","cve":"CVE-2024-38221","title":"Microsoft Edge (Chromium-based) Spoofing Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38221","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38221","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38221","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.3,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38221","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38221","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-38221 cve-2024-38221 microsoft edge (chromium-based) spoofing vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38222","cve":"CVE-2024-38222","title":"Microsoft Edge (Chromium-based) Information Disclosure Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38222","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38222","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38222","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38222","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38222","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-38222 cve-2024-38222 microsoft edge (chromium-based) information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38225","cve":"CVE-2024-38225","title":"Microsoft Dynamics 365 Business Central Elevation of Privilege Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38225","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38225","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38225","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38225","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38225","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38225 cve-2024-38225 microsoft dynamics 365 business central elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38226","cve":"CVE-2024-38226","title":"Microsoft Publisher Security Feature Bypass Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38226","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38226","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38226","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.3,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38226","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38226","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38226 cve-2024-38226 microsoft publisher security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38227","cve":"CVE-2024-38227","title":"Microsoft SharePoint Server Remote Code Execution Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38227","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38227","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38227","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.2,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38227","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38227","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38227 cve-2024-38227 microsoft sharepoint server remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38228","cve":"CVE-2024-38228","title":"Microsoft SharePoint Server Remote Code Execution Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38228","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38228","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38228","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.2,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38228","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38228","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38228 cve-2024-38228 microsoft sharepoint server remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38230","cve":"CVE-2024-38230","title":"Windows Standards-Based Storage Management Service Denial of Service Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38230","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38230","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38230","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38230","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38230","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-38230 cve-2024-38230 windows standards-based storage management service denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38231","cve":"CVE-2024-38231","title":"Windows Remote Desktop Licensing Service Denial of Service Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38231","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38231","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38231","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38231","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38231","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-38231 cve-2024-38231 windows remote desktop licensing service denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38232","cve":"CVE-2024-38232","title":"Windows Networking Denial of Service Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38232","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38232","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38232","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38232","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38232","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38232 cve-2024-38232 windows networking denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38233","cve":"CVE-2024-38233","title":"Windows Networking Denial of Service Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38233","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38233","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38233","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38233","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38233","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38233 cve-2024-38233 windows networking denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38234","cve":"CVE-2024-38234","title":"Windows Networking Denial of Service Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38234","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38234","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38234","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38234","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38234","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-38234 cve-2024-38234 windows networking denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38235","cve":"CVE-2024-38235","title":"Windows Hyper-V Denial of Service Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38235","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38235","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38235","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38235","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38235","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-38235 cve-2024-38235 windows hyper-v denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38236","cve":"CVE-2024-38236","title":"DHCP Server Service Denial of Service Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38236","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38236","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38236","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38236","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38236","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38236 cve-2024-38236 dhcp server service denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38237","cve":"CVE-2024-38237","title":"Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38237","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38237","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38237","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38237","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38237","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38237 cve-2024-38237 kernel streaming wow thunk service driver elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38238","cve":"CVE-2024-38238","title":"Kernel Streaming Service Driver Elevation of Privilege Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38238","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38238","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38238","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38238","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38238","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38238 cve-2024-38238 kernel streaming service driver elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38239","cve":"CVE-2024-38239","title":"Windows Kerberos Elevation of Privilege Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38239","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38239","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38239","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.2,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38239","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38239","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38239 cve-2024-38239 windows kerberos elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38240","cve":"CVE-2024-38240","title":"Windows Remote Access Connection Manager Elevation of Privilege Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38240","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38240","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38240","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.1,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38240","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38240","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38240 cve-2024-38240 windows remote access connection manager elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38241","cve":"CVE-2024-38241","title":"Kernel Streaming Service Driver Elevation of Privilege Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38241","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38241","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38241","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38241","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38241","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38241 cve-2024-38241 kernel streaming service driver elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38242","cve":"CVE-2024-38242","title":"Kernel Streaming Service Driver Elevation of Privilege Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38242","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38242","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38242","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38242","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38242","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38242 cve-2024-38242 kernel streaming service driver elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38243","cve":"CVE-2024-38243","title":"Kernel Streaming Service Driver Elevation of Privilege Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38243","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38243","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38243","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38243","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38243","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38243 cve-2024-38243 kernel streaming service driver elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38244","cve":"CVE-2024-38244","title":"Kernel Streaming Service Driver Elevation of Privilege Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38244","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38244","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38244","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38244","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38244","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38244 cve-2024-38244 kernel streaming service driver elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38245","cve":"CVE-2024-38245","title":"Kernel Streaming Service Driver Elevation of Privilege Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38245","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38245","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38245","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38245","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38245","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38245 cve-2024-38245 kernel streaming service driver elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38246","cve":"CVE-2024-38246","title":"Win32k Elevation of Privilege Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38246","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38246","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38246","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38246","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38246","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38246 cve-2024-38246 win32k elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38247","cve":"CVE-2024-38247","title":"Windows Graphics Component Elevation of Privilege Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38247","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38247","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38247","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38247","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38247","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38247 cve-2024-38247 windows graphics component elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38248","cve":"CVE-2024-38248","title":"Windows Storage Elevation of Privilege Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38248","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38248","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38248","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38248","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38248","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38248 cve-2024-38248 windows storage elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38249","cve":"CVE-2024-38249","title":"Windows Graphics Component Elevation of Privilege Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38249","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38249","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38249","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38249","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38249","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38249 cve-2024-38249 windows graphics component elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38250","cve":"CVE-2024-38250","title":"Windows Graphics Component Elevation of Privilege Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38250","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38250","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38250","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38250","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38250","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38250 cve-2024-38250 windows graphics component elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38252","cve":"CVE-2024-38252","title":"Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38252","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38252","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38252","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38252","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38252","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38252 cve-2024-38252 windows win32 kernel subsystem elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38253","cve":"CVE-2024-38253","title":"Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38253","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38253","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38253","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38253","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38253","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38253 cve-2024-38253 windows win32 kernel subsystem elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38254","cve":"CVE-2024-38254","title":"Windows Authentication Information Disclosure Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38254","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38254","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38254","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38254","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38254","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-38254 cve-2024-38254 windows authentication information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38256","cve":"CVE-2024-38256","title":"Windows Kernel-Mode Driver Information Disclosure Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38256","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38256","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38256","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38256","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38256","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-38256 cve-2024-38256 windows kernel-mode driver information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38257","cve":"CVE-2024-38257","title":"Microsoft AllJoyn API Information Disclosure Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38257","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38257","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38257","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38257","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38257","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38257 cve-2024-38257 microsoft alljoyn api information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38258","cve":"CVE-2024-38258","title":"Windows Remote Desktop Licensing Service Information Disclosure Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38258","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38258","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38258","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38258","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38258","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-38258 cve-2024-38258 windows remote desktop licensing service information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38259","cve":"CVE-2024-38259","title":"Microsoft Management Console Remote Code Execution Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38259","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38259","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38259","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38259","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38259","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38259 cve-2024-38259 microsoft management console remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38260","cve":"CVE-2024-38260","title":"Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38260","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38260","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38260","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38260","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38260","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38260 cve-2024-38260 windows remote desktop licensing service remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38263","cve":"CVE-2024-38263","title":"Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38263","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38263","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38263","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38263","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38263","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38263 cve-2024-38263 windows remote desktop licensing service remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38473","cve":"CVE-2024-38473","title":"Apache HTTP Server proxy encoding problem","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38473","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38473","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38473","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.1,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38473","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38473","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38473 cve-2024-38473 apache http server proxy encoding problem microsoft msrc msrc"},{"id":"CVE-2024-38517","cve":"CVE-2024-38517","title":"Github: CVE-2024-38517 TenCent RapidJSON Elevation of Privilege Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38517","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38517","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38517","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38517","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38517","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38517 cve-2024-38517 github: cve-2024-38517 tencent rapidjson elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-38570","cve":"CVE-2024-38570","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38570","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38570","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38570","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38570","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38570","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38570 cve-2024-38570 mariner microsoft msrc msrc"},{"id":"CVE-2024-38571","cve":"CVE-2024-38571","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38571","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38571","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38571","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38571","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38571","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-38571 cve-2024-38571 mariner microsoft msrc msrc"},{"id":"CVE-2024-38581","cve":"CVE-2024-38581","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38581","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38581","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38581","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38581","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38581","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38581 cve-2024-38581 mariner microsoft msrc msrc"},{"id":"CVE-2024-38583","cve":"CVE-2024-38583","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38583","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38583","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38583","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38583","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38583","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-38583 cve-2024-38583 mariner microsoft msrc msrc"},{"id":"CVE-2024-38603","cve":"CVE-2024-38603","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38603","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38603","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38603","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38603","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38603","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-38603 cve-2024-38603 mariner microsoft msrc msrc"},{"id":"CVE-2024-39331","cve":"CVE-2024-39331","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39331","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39331","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39331","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39331","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39331","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2024-39331 cve-2024-39331 mariner microsoft msrc msrc"},{"id":"CVE-2024-39379","cve":"CVE-2024-39379","title":"Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39379","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39379","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39379","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39379","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39379","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-39379 cve-2024-39379 microsoft edge (chromium-based) remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-39472","cve":"CVE-2024-39472","title":"xfs: fix log recovery buffer allocation for the legacy h_size fixup","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39472","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39472","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39472","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39472","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39472","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-39472 cve-2024-39472 xfs: fix log recovery buffer allocation for the legacy h_size fixup microsoft msrc msrc"},{"id":"CVE-2024-39473","cve":"CVE-2024-39473","title":"ASoC: SOF: ipc4-topology: Fix input format query of process modules without base extension","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39473","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39473","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39473","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39473","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39473","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-39473 cve-2024-39473 asoc: sof: ipc4-topology: fix input format query of process modules without base extension microsoft msrc msrc"},{"id":"CVE-2024-39474","cve":"CVE-2024-39474","title":"mm/vmalloc: fix vmalloc which may return null if called with __GFP_NOFAIL","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39474","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39474","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39474","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39474","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39474","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-39474 cve-2024-39474 mm/vmalloc: fix vmalloc which may return null if called with __gfp_nofail microsoft msrc msrc"},{"id":"CVE-2024-39475","cve":"CVE-2024-39475","title":"fbdev: savage: Handle err return when savagefb_check_var failed","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39475","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39475","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39475","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39475","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39475","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-39475 cve-2024-39475 fbdev: savage: handle err return when savagefb_check_var failed microsoft msrc msrc"},{"id":"CVE-2024-39476","cve":"CVE-2024-39476","title":"md/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39476","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39476","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39476","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39476","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39476","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-39476 cve-2024-39476 md/raid5: fix deadlock that raid5d() wait for itself to clear md_sb_change_pending microsoft msrc msrc"},{"id":"CVE-2024-39478","cve":"CVE-2024-39478","title":"crypto: starfive - Do not free stack buffer","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39478","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39478","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39478","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39478","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39478","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-39478 cve-2024-39478 crypto: starfive - do not free stack buffer microsoft msrc msrc"},{"id":"CVE-2024-39479","cve":"CVE-2024-39479","title":"drm/i915/hwmon: Get rid of devm","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39479","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39479","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39479","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39479","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39479","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-39479 cve-2024-39479 drm/i915/hwmon: get rid of devm microsoft msrc msrc"},{"id":"CVE-2024-39480","cve":"CVE-2024-39480","title":"kdb: Fix buffer overflow during tab-complete","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39480","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39480","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39480","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39480","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39480","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-39480 cve-2024-39480 kdb: fix buffer overflow during tab-complete microsoft msrc msrc"},{"id":"CVE-2024-39481","cve":"CVE-2024-39481","title":"media: mc: Fix graph walk in media_pipeline_start","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39481","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39481","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39481","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39481","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39481","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-39481 cve-2024-39481 media: mc: fix graph walk in media_pipeline_start microsoft msrc msrc"},{"id":"CVE-2024-39482","cve":"CVE-2024-39482","title":"bcache: fix variable length array abuse in btree_iter","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39482","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39482","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39482","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39482","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39482","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-39482 cve-2024-39482 bcache: fix variable length array abuse in btree_iter microsoft msrc msrc"},{"id":"CVE-2024-39483","cve":"CVE-2024-39483","title":"KVM: SVM: WARN on vNMI + NMI window iff NMIs are outright masked","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39483","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39483","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39483","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39483","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39483","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-39483 cve-2024-39483 kvm: svm: warn on vnmi + nmi window iff nmis are outright masked microsoft msrc msrc"},{"id":"CVE-2024-39484","cve":"CVE-2024-39484","title":"mmc: davinci: Don't strip remove function when driver is builtin","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39484","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39484","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39484","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39484","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39484","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-39484 cve-2024-39484 mmc: davinci: don't strip remove function when driver is builtin microsoft msrc msrc"},{"id":"CVE-2024-39485","cve":"CVE-2024-39485","title":"media: v4l: async: Properly re-initialise notifier entry in unregister","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39485","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39485","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39485","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39485","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39485","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-39485 cve-2024-39485 media: v4l: async: properly re-initialise notifier entry in unregister microsoft msrc msrc"},{"id":"CVE-2024-39486","cve":"CVE-2024-39486","title":"drm/drm_file: Fix pid refcounting race","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39486","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39486","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39486","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39486","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39486","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-39486 cve-2024-39486 drm/drm_file: fix pid refcounting race microsoft msrc msrc"},{"id":"CVE-2024-39487","cve":"CVE-2024-39487","title":"bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set()","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39487","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39487","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39487","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39487","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39487","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-39487 cve-2024-39487 bonding: fix out-of-bounds read in bond_option_arp_ip_targets_set() microsoft msrc msrc"},{"id":"CVE-2024-39489","cve":"CVE-2024-39489","title":"ipv6: sr: fix memleak in seg6_hmac_init_algo","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39489","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39489","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39489","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39489","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39489","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-39489 cve-2024-39489 ipv6: sr: fix memleak in seg6_hmac_init_algo microsoft msrc msrc"},{"id":"CVE-2024-39493","cve":"CVE-2024-39493","title":"crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39493","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39493","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39493","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39493","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39493","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-39493 cve-2024-39493 crypto: qat - fix adf_dev_reset_sync memory leak microsoft msrc msrc"},{"id":"CVE-2024-39494","cve":"CVE-2024-39494","title":"ima: Fix use-after-free on a dentry's dname.name","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39494","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39494","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39494","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39494","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39494","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-39494 cve-2024-39494 ima: fix use-after-free on a dentry's dname.name microsoft msrc msrc"},{"id":"CVE-2024-39495","cve":"CVE-2024-39495","title":"greybus: Fix use-after-free bug in gb_interface_release due to race condition.","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39495","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39495","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39495","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39495","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39495","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-39495 cve-2024-39495 greybus: fix use-after-free bug in gb_interface_release due to race condition. microsoft msrc msrc"},{"id":"CVE-2024-39496","cve":"CVE-2024-39496","title":"btrfs: zoned: fix use-after-free due to race with dev replace","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39496","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39496","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39496","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39496","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39496","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-39496 cve-2024-39496 btrfs: zoned: fix use-after-free due to race with dev replace microsoft msrc msrc"},{"id":"CVE-2024-39508","cve":"CVE-2024-39508","title":"io_uring/io-wq: Use set_bit() and test_bit() at worker-&gt;flags","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39508","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39508","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39508","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.7,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39508","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39508","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-39508 cve-2024-39508 io_uring/io-wq: use set_bit() and test_bit() at worker-&gt;flags microsoft msrc msrc"},{"id":"CVE-2024-39684","cve":"CVE-2024-39684","title":"Github: CVE-2024-39684 TenCent RapidJSON Elevation of Privilege Vulnerability","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39684","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39684","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39684","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39684","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39684","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-39684 cve-2024-39684 github: cve-2024-39684 tencent rapidjson elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-39695","cve":"CVE-2024-39695","title":"Exiv2 has an out-of-bounds read in AsfVideo::streamProperties","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39695","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39695","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39695","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.3,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39695","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39695","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-39695 cve-2024-39695 exiv2 has an out-of-bounds read in asfvideo::streamproperties microsoft msrc msrc"},{"id":"CVE-2024-39884","cve":"CVE-2024-39884","title":"Apache HTTP Server: source code disclosure with handlers configured via AddType","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39884","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39884","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39884","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.2,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39884","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39884","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-39884 cve-2024-39884 apache http server: source code disclosure with handlers configured via addtype microsoft msrc msrc"},{"id":"CVE-2024-39894","cve":"CVE-2024-39894","title":"OpenSSH 9.5 through 9.7 before 9.8 sometimes allows timing attacks against echo-off password entry (e.g. for su and Sudo) because of an ObscureKeystrokeTiming logic error. Similarl","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39894","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39894","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39894","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39894","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39894","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-39894 cve-2024-39894 openssh 9.5 through 9.7 before 9.8 sometimes allows timing attacks against echo-off password entry (e.g. for su and sudo) because of an obscurekeystroketiming logic error. similarl microsoft msrc msrc"},{"id":"CVE-2024-39908","cve":"CVE-2024-39908","title":"Denial of service in REXML","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39908","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39908","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39908","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.3,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39908","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39908","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-39908 cve-2024-39908 denial of service in rexml microsoft msrc msrc"},{"id":"CVE-2024-39936","cve":"CVE-2024-39936","title":"An issue was discovered in HTTP2 in Qt before 5.15.18 6.x before 6.2.13 6.3.x through 6.5.x before 6.5.7 and 6.6.x through 6.7.x before 6.7.3. Code to make security-relevant decisi","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39936","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39936","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39936","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.9,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39936","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39936","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-39936 cve-2024-39936 an issue was discovered in http2 in qt before 5.15.18 6.x before 6.2.13 6.3.x through 6.5.x before 6.5.7 and 6.6.x through 6.7.x before 6.7.3. code to make security-relevant decisi microsoft msrc msrc"},{"id":"CVE-2024-40647","cve":"CVE-2024-40647","title":"Unintentional exposure of environment variables to subprocesses in sentry-sdk","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40647","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40647","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40647","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.3,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40647","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40647","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-40647 cve-2024-40647 unintentional exposure of environment variables to subprocesses in sentry-sdk microsoft msrc msrc"},{"id":"CVE-2024-4068","cve":"CVE-2024-4068","title":"Memory Exhaustion in braces","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4068","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4068","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4068","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4068","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4068","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-4068 cve-2024-4068 memory exhaustion in braces microsoft msrc msrc"},{"id":"CVE-2024-40725","cve":"CVE-2024-40725","title":"Apache HTTP Server: source code disclosure with handlers configured via AddType","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40725","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40725","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40725","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.3,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40725","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40725","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-40725 cve-2024-40725 apache http server: source code disclosure with handlers configured via addtype microsoft msrc msrc"},{"id":"CVE-2024-4076","cve":"CVE-2024-4076","title":"Assertion failure when serving both stale cache data and authoritative zone content","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4076","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4076","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4076","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4076","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4076","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-4076 cve-2024-4076 assertion failure when serving both stale cache data and authoritative zone content microsoft msrc msrc"},{"id":"CVE-2024-40897","cve":"CVE-2024-40897","title":"Stack-based buffer overflow vulnerability exists in orcparse.c of ORC versions prior to 0.4.39. If a developer is tricked to process a specially crafted file with the affected ORC","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40897","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40897","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40897","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40897","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40897","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-40897 cve-2024-40897 stack-based buffer overflow vulnerability exists in orcparse.c of orc versions prior to 0.4.39. if a developer is tricked to process a specially crafted file with the affected orc microsoft msrc msrc"},{"id":"CVE-2024-40898","cve":"CVE-2024-40898","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40898","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40898","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40898","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40898","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40898","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-40898 cve-2024-40898 mariner microsoft msrc msrc"},{"id":"CVE-2024-40902","cve":"CVE-2024-40902","title":"jfs: xattr: fix buffer overflow for invalid xattr","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40902","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40902","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40902","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40902","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40902","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-40902 cve-2024-40902 jfs: xattr: fix buffer overflow for invalid xattr microsoft msrc msrc"},{"id":"CVE-2024-40915","cve":"CVE-2024-40915","title":"riscv: rewrite __kernel_map_pages() to fix sleeping in invalid context","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40915","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40915","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40915","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40915","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40915","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-40915 cve-2024-40915 riscv: rewrite __kernel_map_pages() to fix sleeping in invalid context microsoft msrc msrc"},{"id":"CVE-2024-40918","cve":"CVE-2024-40918","title":"parisc: Try to fix random segmentation faults in package builds","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40918","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40918","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40918","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.3,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40918","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40918","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-40918 cve-2024-40918 parisc: try to fix random segmentation faults in package builds microsoft msrc msrc"},{"id":"CVE-2024-40951","cve":"CVE-2024-40951","title":"ocfs2: fix NULL pointer dereference in ocfs2_abort_trigger()","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40951","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40951","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40951","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40951","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40951","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-40951 cve-2024-40951 ocfs2: fix null pointer dereference in ocfs2_abort_trigger() microsoft msrc msrc"},{"id":"CVE-2024-40952","cve":"CVE-2024-40952","title":"ocfs2: fix NULL pointer dereference in ocfs2_journal_dirty()","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40952","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40952","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40952","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40952","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40952","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-40952 cve-2024-40952 ocfs2: fix null pointer dereference in ocfs2_journal_dirty() microsoft msrc msrc"},{"id":"CVE-2024-40960","cve":"CVE-2024-40960","title":"ipv6: prevent possible NULL dereference in rt6_probe()","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40960","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40960","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40960","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40960","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40960","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-40960 cve-2024-40960 ipv6: prevent possible null dereference in rt6_probe() microsoft msrc msrc"},{"id":"CVE-2024-40961","cve":"CVE-2024-40961","title":"ipv6: prevent possible NULL deref in fib6_nh_init()","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40961","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40961","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40961","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40961","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40961","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-40961 cve-2024-40961 ipv6: prevent possible null deref in fib6_nh_init() microsoft msrc msrc"},{"id":"CVE-2024-40965","cve":"CVE-2024-40965","title":"i2c: lpi2c: Avoid calling clk_get_rate during transfer","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40965","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40965","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40965","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40965","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40965","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-40965 cve-2024-40965 i2c: lpi2c: avoid calling clk_get_rate during transfer microsoft msrc msrc"},{"id":"CVE-2024-40966","cve":"CVE-2024-40966","title":"tty: add the option to have a tty reject a new ldisc","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40966","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40966","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40966","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40966","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40966","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-40966 cve-2024-40966 tty: add the option to have a tty reject a new ldisc microsoft msrc msrc"},{"id":"CVE-2024-40969","cve":"CVE-2024-40969","title":"f2fs: don't set RO when shutting down f2fs","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40969","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40969","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40969","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40969","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40969","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-40969 cve-2024-40969 f2fs: don't set ro when shutting down f2fs microsoft msrc msrc"},{"id":"CVE-2024-40973","cve":"CVE-2024-40973","title":"media: mtk-vcodec: potential null pointer deference in SCP","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40973","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40973","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40973","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40973","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40973","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-40973 cve-2024-40973 media: mtk-vcodec: potential null pointer deference in scp microsoft msrc msrc"},{"id":"CVE-2024-40977","cve":"CVE-2024-40977","title":"wifi: mt76: mt7921s: fix potential hung tasks during chip recovery","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40977","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40977","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40977","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40977","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40977","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-40977 cve-2024-40977 wifi: mt76: mt7921s: fix potential hung tasks during chip recovery microsoft msrc msrc"},{"id":"CVE-2024-40979","cve":"CVE-2024-40979","title":"wifi: ath12k: fix kernel crash during resume","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40979","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40979","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40979","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.7,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40979","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40979","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-40979 cve-2024-40979 wifi: ath12k: fix kernel crash during resume microsoft msrc msrc"},{"id":"CVE-2024-40989","cve":"CVE-2024-40989","title":"KVM: arm64: Disassociate vcpus from redistributor region on teardown","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40989","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40989","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40989","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.6,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40989","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40989","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-40989 cve-2024-40989 kvm: arm64: disassociate vcpus from redistributor region on teardown microsoft msrc msrc"},{"id":"CVE-2024-40994","cve":"CVE-2024-40994","title":"ptp: fix integer overflow in max_vclocks_store","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40994","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40994","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40994","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40994","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40994","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-40994 cve-2024-40994 ptp: fix integer overflow in max_vclocks_store microsoft msrc msrc"},{"id":"CVE-2024-40995","cve":"CVE-2024-40995","title":"net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40995","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40995","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40995","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40995","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40995","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-40995 cve-2024-40995 net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() microsoft msrc msrc"},{"id":"CVE-2024-40996","cve":"CVE-2024-40996","title":"bpf: Avoid splat in pskb_pull_reason","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40996","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40996","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40996","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40996","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40996","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-40996 cve-2024-40996 bpf: avoid splat in pskb_pull_reason microsoft msrc msrc"},{"id":"CVE-2024-40997","cve":"CVE-2024-40997","title":"cpufreq: amd-pstate: fix memory leak on CPU EPP exit","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40997","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40997","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40997","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40997","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40997","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-40997 cve-2024-40997 cpufreq: amd-pstate: fix memory leak on cpu epp exit microsoft msrc msrc"},{"id":"CVE-2024-40998","cve":"CVE-2024-40998","title":"ext4: fix uninitialized ratelimit_state-&gt;lock access in __ext4_fill_super()","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40998","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40998","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40998","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40998","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40998","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-40998 cve-2024-40998 ext4: fix uninitialized ratelimit_state-&gt;lock access in __ext4_fill_super() microsoft msrc msrc"},{"id":"CVE-2024-40999","cve":"CVE-2024-40999","title":"net: ena: Add validation for completion descriptors consistency","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40999","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40999","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40999","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.4,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40999","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40999","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-40999 cve-2024-40999 net: ena: add validation for completion descriptors consistency microsoft msrc msrc"},{"id":"CVE-2024-41000","cve":"CVE-2024-41000","title":"block/ioctl: prefer different overflow check","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41000","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41000","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41000","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41000","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41000","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-41000 cve-2024-41000 block/ioctl: prefer different overflow check microsoft msrc msrc"},{"id":"CVE-2024-41001","cve":"CVE-2024-41001","title":"io_uring/sqpoll: work around a potential audit memory leak","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41001","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41001","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41001","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41001","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41001","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-41001 cve-2024-41001 io_uring/sqpoll: work around a potential audit memory leak microsoft msrc msrc"},{"id":"CVE-2024-41002","cve":"CVE-2024-41002","title":"crypto: hisilicon/sec - Fix memory leak for sec resource release","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41002","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41002","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41002","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41002","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41002","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-41002 cve-2024-41002 crypto: hisilicon/sec - fix memory leak for sec resource release microsoft msrc msrc"},{"id":"CVE-2024-41006","cve":"CVE-2024-41006","title":"netrom: Fix a memory leak in nr_heartbeat_expiry()","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41006","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41006","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41006","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41006","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41006","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-41006 cve-2024-41006 netrom: fix a memory leak in nr_heartbeat_expiry() microsoft msrc msrc"},{"id":"CVE-2024-41007","cve":"CVE-2024-41007","title":"tcp: avoid too many retransmit packets","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41007","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41007","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41007","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":3.3,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41007","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41007","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2024-41007 cve-2024-41007 tcp: avoid too many retransmit packets microsoft msrc msrc"},{"id":"CVE-2024-41008","cve":"CVE-2024-41008","title":"drm/amdgpu: change vm-&gt;task_info handling","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41008","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41008","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41008","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.4,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41008","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41008","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-41008 cve-2024-41008 drm/amdgpu: change vm-&gt;task_info handling microsoft msrc msrc"},{"id":"CVE-2024-41009","cve":"CVE-2024-41009","title":"bpf: Fix overrunning reservations in ringbuf","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41009","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41009","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41009","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41009","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41009","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-41009 cve-2024-41009 bpf: fix overrunning reservations in ringbuf microsoft msrc msrc"},{"id":"CVE-2024-41010","cve":"CVE-2024-41010","title":"bpf: Fix too early release of tcx_entry","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41010","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41010","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41010","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41010","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41010","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-41010 cve-2024-41010 bpf: fix too early release of tcx_entry microsoft msrc msrc"},{"id":"CVE-2024-41011","cve":"CVE-2024-41011","title":"drm/amdkfd: don't allow mapping the MMIO HDP page with large pages","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41011","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41011","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41011","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41011","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41011","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-41011 cve-2024-41011 drm/amdkfd: don't allow mapping the mmio hdp page with large pages microsoft msrc msrc"},{"id":"CVE-2024-41013","cve":"CVE-2024-41013","title":"xfs: don't walk off the end of a directory data block","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41013","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41013","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41013","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41013","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41013","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-41013 cve-2024-41013 xfs: don't walk off the end of a directory data block microsoft msrc msrc"},{"id":"CVE-2024-41030","cve":"CVE-2024-41030","title":"ksmbd: discard write access to the directory open","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41030","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41030","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41030","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41030","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41030","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-41030 cve-2024-41030 ksmbd: discard write access to the directory open microsoft msrc msrc"},{"id":"CVE-2024-41037","cve":"CVE-2024-41037","title":"ASoC: SOF: Intel: hda: fix null deref on system suspend entry","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41037","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41037","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41037","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41037","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41037","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-41037 cve-2024-41037 asoc: sof: intel: hda: fix null deref on system suspend entry microsoft msrc msrc"},{"id":"CVE-2024-41038","cve":"CVE-2024-41038","title":"firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41038","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41038","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41038","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41038","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41038","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-41038 cve-2024-41038 firmware: cs_dsp: prevent buffer overrun when processing v2 alg headers microsoft msrc msrc"},{"id":"CVE-2024-41045","cve":"CVE-2024-41045","title":"bpf: Defer work in bpf_timer_cancel_and_free","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41045","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41045","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41045","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.1,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41045","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41045","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-41045 cve-2024-41045 bpf: defer work in bpf_timer_cancel_and_free microsoft msrc msrc"},{"id":"CVE-2024-41046","cve":"CVE-2024-41046","title":"net: ethernet: lantiq_etop: fix double free in detach","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41046","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41046","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41046","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41046","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41046","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-41046 cve-2024-41046 net: ethernet: lantiq_etop: fix double free in detach microsoft msrc msrc"},{"id":"CVE-2024-41049","cve":"CVE-2024-41049","title":"filelock: fix potential use-after-free in posix_lock_inode","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41049","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41049","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41049","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41049","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41049","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-41049 cve-2024-41049 filelock: fix potential use-after-free in posix_lock_inode microsoft msrc msrc"},{"id":"CVE-2024-41053","cve":"CVE-2024-41053","title":"scsi: ufs: core: Fix ufshcd_abort_one racing issue","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41053","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41053","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41053","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41053","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41053","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-41053 cve-2024-41053 scsi: ufs: core: fix ufshcd_abort_one racing issue microsoft msrc msrc"},{"id":"CVE-2024-41054","cve":"CVE-2024-41054","title":"scsi: ufs: core: Fix ufshcd_clear_cmd racing issue","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41054","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41054","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41054","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41054","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41054","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-41054 cve-2024-41054 scsi: ufs: core: fix ufshcd_clear_cmd racing issue microsoft msrc msrc"},{"id":"CVE-2024-41055","cve":"CVE-2024-41055","title":"mm: prevent derefencing NULL ptr in pfn_section_valid()","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41055","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41055","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41055","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41055","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41055","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-41055 cve-2024-41055 mm: prevent derefencing null ptr in pfn_section_valid() microsoft msrc msrc"},{"id":"CVE-2024-41057","cve":"CVE-2024-41057","title":"cachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie()","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41057","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41057","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41057","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41057","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41057","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-41057 cve-2024-41057 cachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie() microsoft msrc msrc"},{"id":"CVE-2024-41058","cve":"CVE-2024-41058","title":"cachefiles: fix slab-use-after-free in fscache_withdraw_volume()","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41058","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41058","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41058","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41058","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41058","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-41058 cve-2024-41058 cachefiles: fix slab-use-after-free in fscache_withdraw_volume() microsoft msrc msrc"},{"id":"CVE-2024-41062","cve":"CVE-2024-41062","title":"bluetooth/l2cap: sync sock recv cb and release","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41062","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41062","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41062","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41062","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41062","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-41062 cve-2024-41062 bluetooth/l2cap: sync sock recv cb and release microsoft msrc msrc"},{"id":"CVE-2024-41064","cve":"CVE-2024-41064","title":"powerpc/eeh: avoid possible crash when edev-&gt;pdev changes","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41064","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41064","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41064","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41064","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41064","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-41064 cve-2024-41064 powerpc/eeh: avoid possible crash when edev-&gt;pdev changes microsoft msrc msrc"},{"id":"CVE-2024-41066","cve":"CVE-2024-41066","title":"ibmvnic: Add tx check to prevent skb leak","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41066","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41066","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41066","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41066","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41066","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-41066 cve-2024-41066 ibmvnic: add tx check to prevent skb leak microsoft msrc msrc"},{"id":"CVE-2024-41067","cve":"CVE-2024-41067","title":"btrfs: scrub: handle RST lookup error correctly","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41067","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41067","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41067","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.7,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41067","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41067","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-41067 cve-2024-41067 btrfs: scrub: handle rst lookup error correctly microsoft msrc msrc"},{"id":"CVE-2024-41069","cve":"CVE-2024-41069","title":"ASoC: topology: Fix references to freed memory","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41069","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41069","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41069","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41069","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41069","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-41069 cve-2024-41069 asoc: topology: fix references to freed memory microsoft msrc msrc"},{"id":"CVE-2024-41070","cve":"CVE-2024-41070","title":"KVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group()","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41070","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41070","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41070","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41070","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41070","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-41070 cve-2024-41070 kvm: ppc: book3s hv: prevent uaf in kvm_spapr_tce_attach_iommu_group() microsoft msrc msrc"},{"id":"CVE-2024-41073","cve":"CVE-2024-41073","title":"nvme: avoid double free special payload","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41073","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41073","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41073","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41073","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41073","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-41073 cve-2024-41073 nvme: avoid double free special payload microsoft msrc msrc"},{"id":"CVE-2024-41076","cve":"CVE-2024-41076","title":"NFSv4: Fix memory leak in nfs4_set_security_label","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41076","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41076","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41076","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41076","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41076","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-41076 cve-2024-41076 nfsv4: fix memory leak in nfs4_set_security_label microsoft msrc msrc"},{"id":"CVE-2024-41079","cve":"CVE-2024-41079","title":"nvmet: always initialize cqe.result","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41079","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41079","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41079","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41079","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41079","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-41079 cve-2024-41079 nvmet: always initialize cqe.result microsoft msrc msrc"},{"id":"CVE-2024-41080","cve":"CVE-2024-41080","title":"io_uring: fix possible deadlock in io_register_iowq_max_workers()","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41080","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41080","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41080","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41080","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41080","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-41080 cve-2024-41080 io_uring: fix possible deadlock in io_register_iowq_max_workers() microsoft msrc msrc"},{"id":"CVE-2024-41082","cve":"CVE-2024-41082","title":"nvme-fabrics: use reserved tag for reg read/write command","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41082","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41082","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41082","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41082","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41082","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-41082 cve-2024-41082 nvme-fabrics: use reserved tag for reg read/write command microsoft msrc msrc"},{"id":"CVE-2024-41084","cve":"CVE-2024-41084","title":"cxl/region: Avoid null pointer dereference in region lookup","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41084","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41084","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41084","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41084","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41084","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-41084 cve-2024-41084 cxl/region: avoid null pointer dereference in region lookup microsoft msrc msrc"},{"id":"CVE-2024-41087","cve":"CVE-2024-41087","title":"ata: libata-core: Fix double free on error","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41087","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41087","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41087","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41087","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41087","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-41087 cve-2024-41087 ata: libata-core: fix double free on error microsoft msrc msrc"},{"id":"CVE-2024-41088","cve":"CVE-2024-41088","title":"can: mcp251xfd: fix infinite loop when xmit fails","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41088","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41088","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41088","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41088","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41088","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-41088 cve-2024-41088 can: mcp251xfd: fix infinite loop when xmit fails microsoft msrc msrc"},{"id":"CVE-2024-41089","cve":"CVE-2024-41089","title":"drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41089","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41089","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41089","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41089","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41089","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-41089 cve-2024-41089 drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes microsoft msrc msrc"},{"id":"CVE-2024-41092","cve":"CVE-2024-41092","title":"drm/i915/gt: Fix potential UAF by revoke of fence registers","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41092","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41092","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41092","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41092","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41092","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-41092 cve-2024-41092 drm/i915/gt: fix potential uaf by revoke of fence registers microsoft msrc msrc"},{"id":"CVE-2024-41093","cve":"CVE-2024-41093","title":"drm/amdgpu: avoid using null object of framebuffer","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41093","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41093","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41093","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41093","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41093","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-41093 cve-2024-41093 drm/amdgpu: avoid using null object of framebuffer microsoft msrc msrc"},{"id":"CVE-2024-41094","cve":"CVE-2024-41094","title":"drm/fbdev-dma: Only set smem_start is enable per module option","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41094","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41094","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41094","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41094","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41094","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-41094 cve-2024-41094 drm/fbdev-dma: only set smem_start is enable per module option microsoft msrc msrc"},{"id":"CVE-2024-41095","cve":"CVE-2024-41095","title":"drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41095","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41095","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41095","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41095","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41095","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-41095 cve-2024-41095 drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes microsoft msrc msrc"},{"id":"CVE-2024-41096","cve":"CVE-2024-41096","title":"PCI/MSI: Fix UAF in msi_capability_init","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41096","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41096","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41096","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41096","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41096","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-41096 cve-2024-41096 pci/msi: fix uaf in msi_capability_init microsoft msrc msrc"},{"id":"CVE-2024-41097","cve":"CVE-2024-41097","title":"usb: atm: cxacru: fix endpoint checking in cxacru_bind()","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41097","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41097","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41097","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41097","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41097","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-41097 cve-2024-41097 usb: atm: cxacru: fix endpoint checking in cxacru_bind() microsoft msrc msrc"},{"id":"CVE-2024-41098","cve":"CVE-2024-41098","title":"ata: libata-core: Fix null pointer dereference on error","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41098","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41098","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41098","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41098","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41098","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-41098 cve-2024-41098 ata: libata-core: fix null pointer dereference on error microsoft msrc msrc"},{"id":"CVE-2024-41110","cve":"CVE-2024-41110","title":"Moby authz zero length regression","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41110","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41110","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41110","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.9,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41110","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41110","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2024-41110 cve-2024-41110 moby authz zero length regression microsoft msrc msrc"},{"id":"CVE-2024-41184","cve":"CVE-2024-41184","title":"In the vrrp_ipsets_handler handler (fglobal_parser.c) of keepalived through 2.3.1 an integer overflow can occur. NOTE: this CVE Record might not be worthwhile because an empty ipse","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41184","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41184","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41184","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41184","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41184","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2024-41184 cve-2024-41184 in the vrrp_ipsets_handler handler (fglobal_parser.c) of keepalived through 2.3.1 an integer overflow can occur. note: this cve record might not be worthwhile because an empty ipse microsoft msrc msrc"},{"id":"CVE-2024-41671","cve":"CVE-2024-41671","title":"twisted.web has disordered HTTP pipeline response","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41671","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41671","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41671","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.3,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41671","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41671","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-41671 cve-2024-41671 twisted.web has disordered http pipeline response microsoft msrc msrc"},{"id":"CVE-2024-41810","cve":"CVE-2024-41810","title":"HTML injection in HTTP redirect body","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41810","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41810","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41810","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.1,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41810","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41810","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-41810 cve-2024-41810 html injection in http redirect body microsoft msrc msrc"},{"id":"CVE-2024-42064","cve":"CVE-2024-42064","title":"drm/amd/display: Skip pipe if the pipe idx not set properly","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42064","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42064","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42064","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42064","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42064","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42064 cve-2024-42064 drm/amd/display: skip pipe if the pipe idx not set properly microsoft msrc msrc"},{"id":"CVE-2024-42065","cve":"CVE-2024-42065","title":"drm/xe: Add a NULL check in xe_ttm_stolen_mgr_init","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42065","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42065","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42065","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42065","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42065","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42065 cve-2024-42065 drm/xe: add a null check in xe_ttm_stolen_mgr_init microsoft msrc msrc"},{"id":"CVE-2024-42066","cve":"CVE-2024-42066","title":"drm/xe: Fix potential integer overflow in page size calculation","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42066","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42066","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42066","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42066","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42066","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42066 cve-2024-42066 drm/xe: fix potential integer overflow in page size calculation microsoft msrc msrc"},{"id":"CVE-2024-42067","cve":"CVE-2024-42067","title":"bpf: Take return from set_memory_rox() into account with bpf_jit_binary_lock_ro()","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42067","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42067","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42067","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42067","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42067","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42067 cve-2024-42067 bpf: take return from set_memory_rox() into account with bpf_jit_binary_lock_ro() microsoft msrc msrc"},{"id":"CVE-2024-42068","cve":"CVE-2024-42068","title":"bpf: Take return from set_memory_ro() into account with bpf_prog_lock_ro()","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42068","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42068","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42068","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42068","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42068","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42068 cve-2024-42068 bpf: take return from set_memory_ro() into account with bpf_prog_lock_ro() microsoft msrc msrc"},{"id":"CVE-2024-42069","cve":"CVE-2024-42069","title":"net: mana: Fix possible double free in error handling path","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42069","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42069","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42069","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42069","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42069","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42069 cve-2024-42069 net: mana: fix possible double free in error handling path microsoft msrc msrc"},{"id":"CVE-2024-42070","cve":"CVE-2024-42070","title":"netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42070","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42070","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42070","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42070","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42070","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42070 cve-2024-42070 netfilter: nf_tables: fully validate nft_data_value on store to data registers microsoft msrc msrc"},{"id":"CVE-2024-42071","cve":"CVE-2024-42071","title":"ionic: use dev_consume_skb_any outside of napi","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42071","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42071","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42071","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42071","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42071","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42071 cve-2024-42071 ionic: use dev_consume_skb_any outside of napi microsoft msrc msrc"},{"id":"CVE-2024-42073","cve":"CVE-2024-42073","title":"mlxsw: spectrum_buffers: Fix memory corruptions on Spectrum-4 systems","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42073","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42073","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42073","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42073","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42073","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42073 cve-2024-42073 mlxsw: spectrum_buffers: fix memory corruptions on spectrum-4 systems microsoft msrc msrc"},{"id":"CVE-2024-42074","cve":"CVE-2024-42074","title":"ASoC: amd: acp: add a null check for chip_pdev structure","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42074","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42074","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42074","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42074","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42074","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42074 cve-2024-42074 asoc: amd: acp: add a null check for chip_pdev structure microsoft msrc msrc"},{"id":"CVE-2024-42075","cve":"CVE-2024-42075","title":"bpf: Fix remap of arena.","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42075","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42075","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42075","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42075","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42075","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42075 cve-2024-42075 bpf: fix remap of arena. microsoft msrc msrc"},{"id":"CVE-2024-42076","cve":"CVE-2024-42076","title":"net: can: j1939: Initialize unused data in j1939_send_one()","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42076","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42076","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42076","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42076","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42076","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42076 cve-2024-42076 net: can: j1939: initialize unused data in j1939_send_one() microsoft msrc msrc"},{"id":"CVE-2024-42077","cve":"CVE-2024-42077","title":"ocfs2: fix DIO failure due to insufficient transaction credits","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42077","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42077","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42077","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42077","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42077","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42077 cve-2024-42077 ocfs2: fix dio failure due to insufficient transaction credits microsoft msrc msrc"},{"id":"CVE-2024-42078","cve":"CVE-2024-42078","title":"nfsd: initialise nfsd_info.mutex early.","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42078","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42078","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42078","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42078","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42078","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42078 cve-2024-42078 nfsd: initialise nfsd_info.mutex early. microsoft msrc msrc"},{"id":"CVE-2024-42079","cve":"CVE-2024-42079","title":"gfs2: Fix NULL pointer dereference in gfs2_log_flush","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42079","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42079","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42079","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42079","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42079","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42079 cve-2024-42079 gfs2: fix null pointer dereference in gfs2_log_flush microsoft msrc msrc"},{"id":"CVE-2024-42080","cve":"CVE-2024-42080","title":"RDMA/restrack: Fix potential invalid address access","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42080","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42080","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42080","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42080","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42080","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42080 cve-2024-42080 rdma/restrack: fix potential invalid address access microsoft msrc msrc"},{"id":"CVE-2024-42081","cve":"CVE-2024-42081","title":"drm/xe/xe_devcoredump: Check NULL before assignments","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42081","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42081","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42081","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42081","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42081","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42081 cve-2024-42081 drm/xe/xe_devcoredump: check null before assignments microsoft msrc msrc"},{"id":"CVE-2024-42082","cve":"CVE-2024-42082","title":"xdp: Remove WARN() from __xdp_reg_mem_model()","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42082","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42082","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42082","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42082","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42082","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42082 cve-2024-42082 xdp: remove warn() from __xdp_reg_mem_model() microsoft msrc msrc"},{"id":"CVE-2024-42083","cve":"CVE-2024-42083","title":"ionic: fix kernel panic due to multi-buffer handling","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42083","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42083","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42083","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42083","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42083","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42083 cve-2024-42083 ionic: fix kernel panic due to multi-buffer handling microsoft msrc msrc"},{"id":"CVE-2024-42085","cve":"CVE-2024-42085","title":"usb: dwc3: core: remove lock of otg mode during gadget suspend/resume to avoid deadlock","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42085","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42085","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42085","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42085","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42085","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42085 cve-2024-42085 usb: dwc3: core: remove lock of otg mode during gadget suspend/resume to avoid deadlock microsoft msrc msrc"},{"id":"CVE-2024-42090","cve":"CVE-2024-42090","title":"pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42090","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42090","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42090","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42090","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42090","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42090 cve-2024-42090 pinctrl: fix deadlock in create_pinctrl() when handling -eprobe_defer microsoft msrc msrc"},{"id":"CVE-2024-42093","cve":"CVE-2024-42093","title":"net/dpaa2: Avoid explicit cpumask var allocation on stack","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42093","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42093","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42093","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42093","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42093","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-42093 cve-2024-42093 net/dpaa2: avoid explicit cpumask var allocation on stack microsoft msrc msrc"},{"id":"CVE-2024-42101","cve":"CVE-2024-42101","title":"drm/nouveau: fix null pointer dereference in nouveau_connector_get_modes","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42101","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42101","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42101","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42101","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42101","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42101 cve-2024-42101 drm/nouveau: fix null pointer dereference in nouveau_connector_get_modes microsoft msrc msrc"},{"id":"CVE-2024-42102","cve":"CVE-2024-42102","title":"Revert \"mm/writeback: fix possible divide-by-zero in wb_dirty_limits() again\"","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42102","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42102","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42102","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.7,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42102","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42102","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42102 cve-2024-42102 revert \"mm/writeback: fix possible divide-by-zero in wb_dirty_limits() again\" microsoft msrc msrc"},{"id":"CVE-2024-42107","cve":"CVE-2024-42107","title":"ice: Don't process extts if PTP is disabled","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42107","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42107","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42107","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.7,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42107","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42107","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42107 cve-2024-42107 ice: don't process extts if ptp is disabled microsoft msrc msrc"},{"id":"CVE-2024-42110","cve":"CVE-2024-42110","title":"net: ntb_netdev: Move ntb_netdev_rx_handler() to call netif_rx() from __netif_rx()","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42110","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42110","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42110","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42110","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42110","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42110 cve-2024-42110 net: ntb_netdev: move ntb_netdev_rx_handler() to call netif_rx() from __netif_rx() microsoft msrc msrc"},{"id":"CVE-2024-42114","cve":"CVE-2024-42114","title":"wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42114","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42114","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42114","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.4,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42114","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42114","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42114 cve-2024-42114 wifi: cfg80211: restrict nl80211_attr_txq_quantum values microsoft msrc msrc"},{"id":"CVE-2024-42118","cve":"CVE-2024-42118","title":"drm/amd/display: Do not return negative stream id for array","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42118","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42118","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42118","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.2,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42118","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42118","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42118 cve-2024-42118 drm/amd/display: do not return negative stream id for array microsoft msrc msrc"},{"id":"CVE-2024-42122","cve":"CVE-2024-42122","title":"drm/amd/display: Add NULL pointer check for kzalloc","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42122","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42122","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42122","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42122","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42122","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42122 cve-2024-42122 drm/amd/display: add null pointer check for kzalloc microsoft msrc msrc"},{"id":"CVE-2024-42128","cve":"CVE-2024-42128","title":"leds: an30259a: Use devm_mutex_init() for mutex initialization","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42128","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42128","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42128","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42128","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42128","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42128 cve-2024-42128 leds: an30259a: use devm_mutex_init() for mutex initialization microsoft msrc msrc"},{"id":"CVE-2024-42129","cve":"CVE-2024-42129","title":"leds: mlxreg: Use devm_mutex_init() for mutex initialization","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42129","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42129","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42129","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42129","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42129","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42129 cve-2024-42129 leds: mlxreg: use devm_mutex_init() for mutex initialization microsoft msrc msrc"},{"id":"CVE-2024-42134","cve":"CVE-2024-42134","title":"virtio-pci: Check if is_avq is NULL","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42134","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42134","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42134","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42134","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42134","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42134 cve-2024-42134 virtio-pci: check if is_avq is null microsoft msrc msrc"},{"id":"CVE-2024-42135","cve":"CVE-2024-42135","title":"vhost_task: Handle SIGKILL by flushing work and exiting","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42135","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42135","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42135","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42135","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42135","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42135 cve-2024-42135 vhost_task: handle sigkill by flushing work and exiting microsoft msrc msrc"},{"id":"CVE-2024-42140","cve":"CVE-2024-42140","title":"riscv: kexec: Avoid deadlock in kexec crash path","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42140","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42140","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42140","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42140","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42140","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42140 cve-2024-42140 riscv: kexec: avoid deadlock in kexec crash path microsoft msrc msrc"},{"id":"CVE-2024-42151","cve":"CVE-2024-42151","title":"bpf: mark bpf_dummy_struct_ops.test_1 parameter as nullable","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42151","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42151","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42151","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42151","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42151","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42151 cve-2024-42151 bpf: mark bpf_dummy_struct_ops.test_1 parameter as nullable microsoft msrc msrc"},{"id":"CVE-2024-42152","cve":"CVE-2024-42152","title":"nvmet: fix a possible leak when destroy a ctrl during qp establishment","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42152","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42152","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42152","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.7,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42152","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42152","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42152 cve-2024-42152 nvmet: fix a possible leak when destroy a ctrl during qp establishment microsoft msrc msrc"},{"id":"CVE-2024-42153","cve":"CVE-2024-42153","title":"i2c: pnx: Fix potential deadlock warning from del_timer_sync() call in isr","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42153","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42153","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42153","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42153","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42153","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42153 cve-2024-42153 i2c: pnx: fix potential deadlock warning from del_timer_sync() call in isr microsoft msrc msrc"},{"id":"CVE-2024-42154","cve":"CVE-2024-42154","title":"tcp_metrics: validate source addr length","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42154","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42154","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42154","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.4,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42154","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42154","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42154 cve-2024-42154 tcp_metrics: validate source addr length microsoft msrc msrc"},{"id":"CVE-2024-42156","cve":"CVE-2024-42156","title":"s390/pkey: Wipe copies of clear-key structures on failure","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42156","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42156","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42156","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.1,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42156","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42156","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42156 cve-2024-42156 s390/pkey: wipe copies of clear-key structures on failure microsoft msrc msrc"},{"id":"CVE-2024-42157","cve":"CVE-2024-42157","title":"s390/pkey: Wipe sensitive data on failure","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42157","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42157","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42157","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.1,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42157","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42157","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42157 cve-2024-42157 s390/pkey: wipe sensitive data on failure microsoft msrc msrc"},{"id":"CVE-2024-42159","cve":"CVE-2024-42159","title":"scsi: mpi3mr: Sanitise num_phys","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42159","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42159","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42159","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42159","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42159","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-42159 cve-2024-42159 scsi: mpi3mr: sanitise num_phys microsoft msrc msrc"},{"id":"CVE-2024-42160","cve":"CVE-2024-42160","title":"f2fs: check validation of fault attrs in f2fs_build_fault_attr()","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42160","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42160","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42160","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42160","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42160","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-42160 cve-2024-42160 f2fs: check validation of fault attrs in f2fs_build_fault_attr() microsoft msrc msrc"},{"id":"CVE-2024-42161","cve":"CVE-2024-42161","title":"bpf: Avoid uninitialized value in BPF_CORE_READ_BITFIELD","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42161","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42161","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42161","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.3,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42161","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42161","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42161 cve-2024-42161 bpf: avoid uninitialized value in bpf_core_read_bitfield microsoft msrc msrc"},{"id":"CVE-2024-42223","cve":"CVE-2024-42223","title":"media: dvb-frontends: tda10048: Fix integer overflow","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42223","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42223","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42223","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42223","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42223","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42223 cve-2024-42223 media: dvb-frontends: tda10048: fix integer overflow microsoft msrc msrc"},{"id":"CVE-2024-42224","cve":"CVE-2024-42224","title":"net: dsa: mv88e6xxx: Correct check for empty list","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42224","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42224","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42224","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.1,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42224","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42224","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42224 cve-2024-42224 net: dsa: mv88e6xxx: correct check for empty list microsoft msrc msrc"},{"id":"CVE-2024-42225","cve":"CVE-2024-42225","title":"wifi: mt76: replace skb_put with skb_put_zero","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42225","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42225","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42225","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42225","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42225","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-42225 cve-2024-42225 wifi: mt76: replace skb_put with skb_put_zero microsoft msrc msrc"},{"id":"CVE-2024-42228","cve":"CVE-2024-42228","title":"drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42228","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42228","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42228","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42228","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42228","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-42228 cve-2024-42228 drm/amdgpu: using uninitialized value *size when calling amdgpu_vce_cs_reloc microsoft msrc msrc"},{"id":"CVE-2024-42229","cve":"CVE-2024-42229","title":"crypto: aeadcipher - zeroize key buffer after use","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42229","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42229","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42229","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.1,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42229","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42229","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42229 cve-2024-42229 crypto: aeadcipher - zeroize key buffer after use microsoft msrc msrc"},{"id":"CVE-2024-42230","cve":"CVE-2024-42230","title":"powerpc/pseries: Fix scv instruction crash with kexec","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42230","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42230","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42230","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.4,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42230","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42230","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42230 cve-2024-42230 powerpc/pseries: fix scv instruction crash with kexec microsoft msrc msrc"},{"id":"CVE-2024-42268","cve":"CVE-2024-42268","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42268","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42268","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42268","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42268","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42268","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42268 cve-2024-42268 mariner microsoft msrc msrc"},{"id":"CVE-2024-42294","cve":"CVE-2024-42294","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42294","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42294","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42294","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42294","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42294","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42294 cve-2024-42294 mariner microsoft msrc msrc"},{"id":"CVE-2024-42314","cve":"CVE-2024-42314","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42314","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42314","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42314","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42314","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42314","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-42314 cve-2024-42314 mariner microsoft msrc msrc"},{"id":"CVE-2024-42315","cve":"CVE-2024-42315","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42315","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42315","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42315","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42315","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42315","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42315 cve-2024-42315 mariner microsoft msrc msrc"},{"id":"CVE-2024-42316","cve":"CVE-2024-42316","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42316","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42316","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42316","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42316","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42316","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42316 cve-2024-42316 mariner microsoft msrc msrc"},{"id":"CVE-2024-42459","cve":"CVE-2024-42459","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42459","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42459","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42459","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.3,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42459","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42459","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42459 cve-2024-42459 mariner microsoft msrc msrc"},{"id":"CVE-2024-42460","cve":"CVE-2024-42460","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42460","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42460","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42460","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.3,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42460","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42460","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-42460 cve-2024-42460 mariner microsoft msrc msrc"},{"id":"CVE-2024-42461","cve":"CVE-2024-42461","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42461","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42461","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42461","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.1,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42461","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42461","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2024-42461 cve-2024-42461 mariner microsoft msrc msrc"},{"id":"CVE-2024-42861","cve":"CVE-2024-42861","title":"An issue in IEEE 802.1AS linuxptp v.4.2 and before allowing a remote attacker to cause a denial of service via a crafted Pdelay_Req message to the time synchronization function","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42861","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42861","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42861","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42861","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42861","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-42861 cve-2024-42861 an issue in ieee 802.1as linuxptp v.4.2 and before allowing a remote attacker to cause a denial of service via a crafted pdelay_req message to the time synchronization function microsoft msrc msrc"},{"id":"CVE-2024-43168","cve":"CVE-2024-43168","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43168","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43168","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43168","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43168","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43168","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-43168 cve-2024-43168 mariner microsoft msrc msrc"},{"id":"CVE-2024-4317","cve":"CVE-2024-4317","title":"PostgreSQL pg_stats_ext and pg_stats_ext_exprs lack authorization checks","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4317","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4317","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4317","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.3,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4317","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4317","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-4317 cve-2024-4317 postgresql pg_stats_ext and pg_stats_ext_exprs lack authorization checks microsoft msrc msrc"},{"id":"CVE-2024-4323","cve":"CVE-2024-4323","title":"Fluent Bit Memory Corruption Vulnerability","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4323","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4323","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4323","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4323","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4323","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2024-4323 cve-2024-4323 fluent bit memory corruption vulnerability microsoft msrc msrc"},{"id":"CVE-2024-43454","cve":"CVE-2024-43454","title":"Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43454","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43454","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43454","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43454","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43454","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-43454 cve-2024-43454 windows remote desktop licensing service remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-43455","cve":"CVE-2024-43455","title":"Windows Remote Desktop Licensing Service Spoofing Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43455","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43455","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43455","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43455","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43455","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-43455 cve-2024-43455 windows remote desktop licensing service spoofing vulnerability microsoft msrc msrc"},{"id":"CVE-2024-43457","cve":"CVE-2024-43457","title":"Windows Setup and Deployment Elevation of Privilege Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43457","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43457","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43457","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43457","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43457","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-43457 cve-2024-43457 windows setup and deployment elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-43458","cve":"CVE-2024-43458","title":"Windows Networking Information Disclosure Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43458","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43458","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43458","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.7,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43458","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43458","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-43458 cve-2024-43458 windows networking information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2024-43460","cve":"CVE-2024-43460","title":"Dynamics 365 Business Central Elevation of Privilege Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43460","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43460","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43460","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.1,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43460","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43460","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-43460 cve-2024-43460 dynamics 365 business central elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-43461","cve":"CVE-2024-43461","title":"Windows MSHTML Platform Spoofing Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43461","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43461","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43461","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43461","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43461","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-43461 cve-2024-43461 windows mshtml platform spoofing vulnerability microsoft msrc msrc"},{"id":"CVE-2024-43463","cve":"CVE-2024-43463","title":"Microsoft Office Visio Remote Code Execution Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43463","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43463","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43463","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43463","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43463","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-43463 cve-2024-43463 microsoft office visio remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-43464","cve":"CVE-2024-43464","title":"Microsoft SharePoint Server Remote Code Execution Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43464","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43464","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43464","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.2,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43464","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43464","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-43464 cve-2024-43464 microsoft sharepoint server remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-43465","cve":"CVE-2024-43465","title":"Microsoft Excel Elevation of Privilege Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43465","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43465","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43465","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43465","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43465","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-43465 cve-2024-43465 microsoft excel elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-43466","cve":"CVE-2024-43466","title":"Microsoft SharePoint Server Denial of Service Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43466","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43466","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43466","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43466","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43466","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-43466 cve-2024-43466 microsoft sharepoint server denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2024-43467","cve":"CVE-2024-43467","title":"Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43467","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43467","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43467","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43467","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43467","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-43467 cve-2024-43467 windows remote desktop licensing service remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-43469","cve":"CVE-2024-43469","title":"Azure CycleCloud Remote Code Execution Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43469","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43469","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43469","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43469","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43469","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-43469 cve-2024-43469 azure cyclecloud remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-43470","cve":"CVE-2024-43470","title":"Azure Network Watcher VM Agent Elevation of Privilege Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43470","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43470","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43470","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.3,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43470","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43470","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-43470 cve-2024-43470 azure network watcher vm agent elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-43474","cve":"CVE-2024-43474","title":"Microsoft SQL Server Information Disclosure Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43474","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43474","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43474","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.6,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43474","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43474","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-43474 cve-2024-43474 microsoft sql server information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2024-43475","cve":"CVE-2024-43475","title":"Microsoft Windows Admin Center Information Disclosure Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43475","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43475","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43475","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.3,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43475","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43475","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-43475 cve-2024-43475 microsoft windows admin center information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2024-43476","cve":"CVE-2024-43476","title":"Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43476","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43476","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43476","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.6,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43476","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43476","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-43476 cve-2024-43476 microsoft dynamics 365 (on-premises) cross-site scripting vulnerability microsoft msrc msrc"},{"id":"CVE-2024-43479","cve":"CVE-2024-43479","title":"Microsoft Power Automate Desktop Remote Code Execution Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43479","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43479","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43479","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43479","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43479","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-43479 cve-2024-43479 microsoft power automate desktop remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-43482","cve":"CVE-2024-43482","title":"Microsoft Outlook for iOS Information Disclosure Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43482","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43482","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43482","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43482","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43482","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-43482 cve-2024-43482 microsoft outlook for ios information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2024-43487","cve":"CVE-2024-43487","title":"Windows Mark of the Web Security Feature Bypass Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43487","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43487","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43487","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43487","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43487","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-43487 cve-2024-43487 windows mark of the web security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2024-43489","cve":"CVE-2024-43489","title":"Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43489","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43489","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43489","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43489","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43489","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-43489 cve-2024-43489 microsoft edge (chromium-based) remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-43491","cve":"CVE-2024-43491","title":"Microsoft Windows Update Remote Code Execution Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43491","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43491","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43491","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43491","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43491","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2024-43491 cve-2024-43491 microsoft windows update remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-43492","cve":"CVE-2024-43492","title":"Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43492","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43492","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43492","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43492","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43492","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-43492 cve-2024-43492 microsoft autoupdate (mau) elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2024-43495","cve":"CVE-2024-43495","title":"Windows libarchive Remote Code Execution Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43495","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43495","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43495","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.3,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43495","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43495","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-43495 cve-2024-43495 windows libarchive remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-43496","cve":"CVE-2024-43496","title":"Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43496","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43496","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43496","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43496","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43496","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-43496 cve-2024-43496 microsoft edge (chromium-based) remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2024-43833","cve":"CVE-2024-43833","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43833","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43833","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43833","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43833","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43833","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-43833 cve-2024-43833 mariner microsoft msrc msrc"},{"id":"CVE-2024-43837","cve":"CVE-2024-43837","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43837","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43837","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43837","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43837","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43837","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-43837 cve-2024-43837 mariner microsoft msrc msrc"},{"id":"CVE-2024-43859","cve":"CVE-2024-43859","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43859","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43859","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43859","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43859","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43859","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-43859 cve-2024-43859 mariner microsoft msrc msrc"},{"id":"CVE-2024-4418","cve":"CVE-2024-4418","title":"Libvirt: stack use-after-free in virnetclientioeventloop()","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4418","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4418","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4418","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.2,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4418","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4418","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-4418 cve-2024-4418 libvirt: stack use-after-free in virnetclientioeventloop() microsoft msrc msrc"},{"id":"CVE-2024-4467","cve":"CVE-2024-4467","title":"Qemu-kvm: 'qemu-img info' leads to host file read/write","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4467","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4467","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4467","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4467","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4467","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-4467 cve-2024-4467 qemu-kvm: 'qemu-img info' leads to host file read/write microsoft msrc msrc"},{"id":"CVE-2024-44950","cve":"CVE-2024-44950","title":"serial: sc16is7xx: fix invalid FIFO access with special register set","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-44950","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-44950","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-44950","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-44950","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-44950","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-44950 cve-2024-44950 serial: sc16is7xx: fix invalid fifo access with special register set microsoft msrc msrc"},{"id":"CVE-2024-44955","cve":"CVE-2024-44955","title":"Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-44955","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-44955","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-44955","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-44955","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-44955","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-44955 cve-2024-44955 rejected reason: this cve id has been rejected or withdrawn by its cve numbering authority. microsoft msrc msrc"},{"id":"CVE-2024-45619","cve":"CVE-2024-45619","title":"Libopensc: incorrect handling length of buffers or files in libopensc","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-45619","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-45619","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-45619","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.3,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-45619","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-45619","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-45619 cve-2024-45619 libopensc: incorrect handling length of buffers or files in libopensc microsoft msrc msrc"},{"id":"CVE-2024-45769","cve":"CVE-2024-45769","title":"Pcp: pmcd heap corruption through metric pmstore operations","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-45769","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-45769","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-45769","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-45769","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-45769","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-45769 cve-2024-45769 pcp: pmcd heap corruption through metric pmstore operations microsoft msrc msrc"},{"id":"CVE-2024-4603","cve":"CVE-2024-4603","title":"Excessive time spent checking DSA keys and parameters","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4603","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4603","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4603","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.3,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4603","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4603","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-4603 cve-2024-4603 excessive time spent checking dsa keys and parameters microsoft msrc msrc"},{"id":"CVE-2024-46716","cve":"CVE-2024-46716","title":"dmaengine: altera-msgdma: properly free descriptor in msgdma_free_descriptor","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46716","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46716","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46716","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46716","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46716","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-46716 cve-2024-46716 dmaengine: altera-msgdma: properly free descriptor in msgdma_free_descriptor microsoft msrc msrc"},{"id":"CVE-2024-46717","cve":"CVE-2024-46717","title":"net/mlx5e: SHAMPO, Fix incorrect page release","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46717","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46717","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46717","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46717","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46717","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-46717 cve-2024-46717 net/mlx5e: shampo, fix incorrect page release microsoft msrc msrc"},{"id":"CVE-2024-46753","cve":"CVE-2024-46753","title":"btrfs: handle errors from btrfs_dec_ref() properly","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46753","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46753","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46753","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.3,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46753","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46753","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-46753 cve-2024-46753 btrfs: handle errors from btrfs_dec_ref() properly microsoft msrc msrc"},{"id":"CVE-2024-46762","cve":"CVE-2024-46762","title":"xen: privcmd: Fix possible access to a freed kirqfd instance","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46762","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46762","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46762","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46762","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46762","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-46762 cve-2024-46762 xen: privcmd: fix possible access to a freed kirqfd instance microsoft msrc msrc"},{"id":"CVE-2024-46765","cve":"CVE-2024-46765","title":"ice: protect XDP configuration with a mutex","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46765","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46765","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46765","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46765","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46765","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-46765 cve-2024-46765 ice: protect xdp configuration with a mutex microsoft msrc msrc"},{"id":"CVE-2024-46773","cve":"CVE-2024-46773","title":"drm/amd/display: Check denominator pbn_div before used","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46773","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46773","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46773","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46773","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46773","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-46773 cve-2024-46773 drm/amd/display: check denominator pbn_div before used microsoft msrc msrc"},{"id":"CVE-2024-46782","cve":"CVE-2024-46782","title":"ila: call nf_unregister_net_hooks() sooner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46782","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46782","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46782","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46782","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46782","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-46782 cve-2024-46782 ila: call nf_unregister_net_hooks() sooner microsoft msrc msrc"},{"id":"CVE-2024-46786","cve":"CVE-2024-46786","title":"fscache: delete fscache_cookie_lru_timer when fscache exits to avoid UAF","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46786","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46786","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46786","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46786","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46786","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-46786 cve-2024-46786 fscache: delete fscache_cookie_lru_timer when fscache exits to avoid uaf microsoft msrc msrc"},{"id":"CVE-2024-46795","cve":"CVE-2024-46795","title":"ksmbd: unset the binding mark of a reused connection","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46795","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46795","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46795","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46795","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46795","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-46795 cve-2024-46795 ksmbd: unset the binding mark of a reused connection microsoft msrc msrc"},{"id":"CVE-2024-46797","cve":"CVE-2024-46797","title":"powerpc/qspinlock: Fix deadlock in MCS queue","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46797","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46797","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46797","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46797","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46797","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-46797 cve-2024-46797 powerpc/qspinlock: fix deadlock in mcs queue microsoft msrc msrc"},{"id":"CVE-2024-46800","cve":"CVE-2024-46800","title":"sch/netem: fix use after free in netem_dequeue","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46800","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46800","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46800","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46800","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46800","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-46800 cve-2024-46800 sch/netem: fix use after free in netem_dequeue microsoft msrc msrc"},{"id":"CVE-2024-46803","cve":"CVE-2024-46803","title":"drm/amdkfd: Check debug trap enable before write dbg_ev_file","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46803","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46803","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46803","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46803","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46803","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-46803 cve-2024-46803 drm/amdkfd: check debug trap enable before write dbg_ev_file microsoft msrc msrc"},{"id":"CVE-2024-46805","cve":"CVE-2024-46805","title":"drm/amdgpu: fix the waring dereferencing hive","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46805","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46805","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46805","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46805","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46805","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-46805 cve-2024-46805 drm/amdgpu: fix the waring dereferencing hive microsoft msrc msrc"},{"id":"CVE-2024-46807","cve":"CVE-2024-46807","title":"drm/amd/amdgpu: Check tbo resource pointer","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46807","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46807","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46807","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46807","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46807","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-46807 cve-2024-46807 drm/amd/amdgpu: check tbo resource pointer microsoft msrc msrc"},{"id":"CVE-2024-46810","cve":"CVE-2024-46810","title":"drm/bridge: tc358767: Check if fully initialized before signalling HPD event via IRQ","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46810","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46810","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46810","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46810","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46810","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-46810 cve-2024-46810 drm/bridge: tc358767: check if fully initialized before signalling hpd event via irq microsoft msrc msrc"},{"id":"CVE-2024-46814","cve":"CVE-2024-46814","title":"drm/amd/display: Check msg_id before processing transcation","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46814","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46814","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46814","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46814","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46814","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-46814 cve-2024-46814 drm/amd/display: check msg_id before processing transcation microsoft msrc msrc"},{"id":"CVE-2024-46819","cve":"CVE-2024-46819","title":"drm/amdgpu: the warning dereferencing obj for nbio_v7_4","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46819","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46819","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46819","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46819","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46819","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-46819 cve-2024-46819 drm/amdgpu: the warning dereferencing obj for nbio_v7_4 microsoft msrc msrc"},{"id":"CVE-2024-46822","cve":"CVE-2024-46822","title":"arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46822","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46822","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46822","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46822","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46822","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-46822 cve-2024-46822 arm64: acpi: harden get_cpu_for_acpi_id() against missing cpu entry microsoft msrc msrc"},{"id":"CVE-2024-46829","cve":"CVE-2024-46829","title":"rtmutex: Drop rt_mutex::wait_lock before scheduling","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46829","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46829","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46829","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46829","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46829","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-46829 cve-2024-46829 rtmutex: drop rt_mutex::wait_lock before scheduling microsoft msrc msrc"},{"id":"CVE-2024-46831","cve":"CVE-2024-46831","title":"net: microchip: vcap: Fix use-after-free error in kunit test","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46831","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46831","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46831","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46831","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46831","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-46831 cve-2024-46831 net: microchip: vcap: fix use-after-free error in kunit test microsoft msrc msrc"},{"id":"CVE-2024-46835","cve":"CVE-2024-46835","title":"drm/amdgpu: Fix smatch static checker warning","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46835","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46835","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46835","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46835","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46835","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-46835 cve-2024-46835 drm/amdgpu: fix smatch static checker warning microsoft msrc msrc"},{"id":"CVE-2024-46838","cve":"CVE-2024-46838","title":"userfaultfd: don't BUG_ON() if khugepaged yanks our page table","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46838","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46838","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46838","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46838","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46838","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-46838 cve-2024-46838 userfaultfd: don't bug_on() if khugepaged yanks our page table microsoft msrc msrc"},{"id":"CVE-2024-46841","cve":"CVE-2024-46841","title":"btrfs: don't BUG_ON on ENOMEM from btrfs_lookup_extent_info() in walk_down_proc()","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46841","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46841","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46841","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46841","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46841","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-46841 cve-2024-46841 btrfs: don't bug_on on enomem from btrfs_lookup_extent_info() in walk_down_proc() microsoft msrc msrc"},{"id":"CVE-2024-46843","cve":"CVE-2024-46843","title":"scsi: ufs: core: Remove SCSI host only if added","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46843","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46843","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46843","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46843","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46843","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-46843 cve-2024-46843 scsi: ufs: core: remove scsi host only if added microsoft msrc msrc"},{"id":"CVE-2024-46844","cve":"CVE-2024-46844","title":"um: line: always fill *error_out in setup_one_line()","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46844","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46844","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46844","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46844","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46844","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-46844 cve-2024-46844 um: line: always fill *error_out in setup_one_line() microsoft msrc msrc"},{"id":"CVE-2024-46845","cve":"CVE-2024-46845","title":"tracing/timerlat: Only clear timer if a kthread exists","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46845","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46845","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46845","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46845","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46845","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-46845 cve-2024-46845 tracing/timerlat: only clear timer if a kthread exists microsoft msrc msrc"},{"id":"CVE-2024-46846","cve":"CVE-2024-46846","title":"spi: rockchip: Resolve unbalanced runtime PM / system PM handling","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46846","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46846","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46846","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46846","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46846","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-46846 cve-2024-46846 spi: rockchip: resolve unbalanced runtime pm / system pm handling microsoft msrc msrc"},{"id":"CVE-2024-46847","cve":"CVE-2024-46847","title":"mm: vmalloc: ensure vmap_block is initialised before adding to queue","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46847","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46847","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46847","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46847","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46847","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-46847 cve-2024-46847 mm: vmalloc: ensure vmap_block is initialised before adding to queue microsoft msrc msrc"},{"id":"CVE-2024-46848","cve":"CVE-2024-46848","title":"perf/x86/intel: Limit the period on Haswell","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46848","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46848","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46848","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46848","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46848","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-46848 cve-2024-46848 perf/x86/intel: limit the period on haswell microsoft msrc msrc"},{"id":"CVE-2024-46852","cve":"CVE-2024-46852","title":"dma-buf: heaps: Fix off-by-one in CMA heap fault handler","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46852","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46852","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46852","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46852","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46852","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-46852 cve-2024-46852 dma-buf: heaps: fix off-by-one in cma heap fault handler microsoft msrc msrc"},{"id":"CVE-2024-46854","cve":"CVE-2024-46854","title":"net: dpaa: Pad packets to ETH_ZLEN","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46854","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46854","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46854","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46854","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46854","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-46854 cve-2024-46854 net: dpaa: pad packets to eth_zlen microsoft msrc msrc"},{"id":"CVE-2024-46857","cve":"CVE-2024-46857","title":"net/mlx5: Fix bridge mode operations when there are no VFs","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46857","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46857","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46857","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46857","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46857","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-46857 cve-2024-46857 net/mlx5: fix bridge mode operations when there are no vfs microsoft msrc msrc"},{"id":"CVE-2024-46858","cve":"CVE-2024-46858","title":"mptcp: pm: Fix uaf in __timer_delete_sync","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46858","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46858","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46858","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46858","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46858","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-46858 cve-2024-46858 mptcp: pm: fix uaf in __timer_delete_sync microsoft msrc msrc"},{"id":"CVE-2024-46859","cve":"CVE-2024-46859","title":"platform/x86: panasonic-laptop: Fix SINF array out of bounds accesses","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46859","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46859","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46859","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46859","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46859","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-46859 cve-2024-46859 platform/x86: panasonic-laptop: fix sinf array out of bounds accesses microsoft msrc msrc"},{"id":"CVE-2024-46861","cve":"CVE-2024-46861","title":"usbnet: ipheth: do not stop RX on failing RX callback","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46861","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46861","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46861","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46861","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46861","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-46861 cve-2024-46861 usbnet: ipheth: do not stop rx on failing rx callback microsoft msrc msrc"},{"id":"CVE-2024-46863","cve":"CVE-2024-46863","title":"ASoC: Intel: soc-acpi-intel-lnl-match: add missing empty item","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46863","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46863","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46863","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46863","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46863","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-46863 cve-2024-46863 asoc: intel: soc-acpi-intel-lnl-match: add missing empty item microsoft msrc msrc"},{"id":"CVE-2024-4693","cve":"CVE-2024-4693","title":"Qemu-kvm: virtio-pci: improper release of configure vector leads to guest triggerable crash","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4693","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4693","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4693","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4693","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4693","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-4693 cve-2024-4693 qemu-kvm: virtio-pci: improper release of configure vector leads to guest triggerable crash microsoft msrc msrc"},{"id":"CVE-2024-46981","cve":"CVE-2024-46981","title":"Redis' Lua library commands may lead to remote code execution","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46981","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46981","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46981","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46981","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46981","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-46981 cve-2024-46981 redis' lua library commands may lead to remote code execution microsoft msrc msrc"},{"id":"CVE-2024-4770","cve":"CVE-2024-4770","title":"When saving a page to PDF, certain font styles could have led to a potential use-after-free crash. This vulnerability affects Firefox &lt; 126, Firefox ESR &lt; 115.11, and Thunder","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4770","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4770","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4770","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4770","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4770","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-4770 cve-2024-4770 when saving a page to pdf, certain font styles could have led to a potential use-after-free crash. this vulnerability affects firefox &lt; 126, firefox esr &lt; 115.11, and thunder microsoft msrc msrc"},{"id":"CVE-2024-4772","cve":"CVE-2024-4772","title":"An HTTP digest authentication nonce value was generated using `rand()` which could lead to predictable values. This vulnerability affects Firefox &lt; 126.","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4772","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4772","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4772","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.9,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4772","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4772","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-4772 cve-2024-4772 an http digest authentication nonce value was generated using `rand()` which could lead to predictable values. this vulnerability affects firefox &lt; 126. microsoft msrc msrc"},{"id":"CVE-2024-4773","cve":"CVE-2024-4773","title":"When a network error occurred during page load, the prior content could have remained in view with a blank URL bar. This could have been used to obfuscate a spoofed web site. This","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4773","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4773","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4773","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4773","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4773","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-4773 cve-2024-4773 when a network error occurred during page load, the prior content could have remained in view with a blank url bar. this could have been used to obfuscate a spoofed web site. this microsoft msrc msrc"},{"id":"CVE-2024-4775","cve":"CVE-2024-4775","title":"An iterator stop condition was missing when handling WASM code in the built-in profiler, potentially leading to invalid memory access and undefined behavior. *Note:* This issue onl","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4775","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4775","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4775","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.9,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4775","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4775","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-4775 cve-2024-4775 an iterator stop condition was missing when handling wasm code in the built-in profiler, potentially leading to invalid memory access and undefined behavior. *note:* this issue onl microsoft msrc msrc"},{"id":"CVE-2024-4777","cve":"CVE-2024-4777","title":"Memory safety bugs present in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effor","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4777","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4777","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4777","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4777","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4777","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-4777 cve-2024-4777 memory safety bugs present in firefox 125, firefox esr 115.10, and thunderbird 115.10. some of these bugs showed evidence of memory corruption and we presume that with enough effor microsoft msrc msrc"},{"id":"CVE-2024-4778","cve":"CVE-2024-4778","title":"Memory safety bugs present in Firefox 125. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4778","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4778","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4778","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.8,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4778","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4778","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2024-4778 cve-2024-4778 memory safety bugs present in firefox 125. some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to microsoft msrc msrc"},{"id":"CVE-2024-4853","cve":"CVE-2024-4853","title":"Mismatched Memory Management Routines in editcap","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4853","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4853","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4853","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":3.6,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4853","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4853","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2024-4853 cve-2024-4853 mismatched memory management routines in editcap microsoft msrc msrc"},{"id":"CVE-2024-4855","cve":"CVE-2024-4855","title":"Use After Free in editcap","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4855","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4855","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4855","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":3.6,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4855","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4855","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2024-4855 cve-2024-4855 use after free in editcap microsoft msrc msrc"},{"id":"CVE-2024-50338","cve":"CVE-2024-50338","title":"GitHub: CVE-2024-50338 Malformed URL allows information disclosure through git-credential-manager","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-50338","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-50338","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-50338","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.4,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-50338","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-50338","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-50338 cve-2024-50338 github: cve-2024-50338 malformed url allows information disclosure through git-credential-manager microsoft msrc msrc"},{"id":"CVE-2024-51741","cve":"CVE-2024-51741","title":"Redis allows denial-of-service due to malformed ACL selectors","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-51741","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-51741","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-51741","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.4,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-51741","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-51741","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-51741 cve-2024-51741 redis allows denial-of-service due to malformed acl selectors microsoft msrc msrc"},{"id":"CVE-2024-5564","cve":"CVE-2024-5564","title":"Libndp: buffer overflow in route information length field","source_published":"2024-05-14","source_updated":"2026-04-01","source_doc_published":"2024-05-14","source_doc_updated":"2026-04-01","published":"2024-05-14","date":"2024-05-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-5564","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-5564","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-5564","published":"2024-05-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.1,"cve_published":null,"cve_updated":null,"published_at":"2024-05-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-5564","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-5564","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-05-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-5564 cve-2024-5564 libndp: buffer overflow in route information length field microsoft msrc msrc"},{"id":"CVE-2024-6232","cve":"CVE-2024-6232","title":"Regular-expression DoS when parsing TarFile headers","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6232","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6232","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6232","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6232","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6232","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-6232 cve-2024-6232 regular-expression dos when parsing tarfile headers microsoft msrc msrc"},{"id":"CVE-2024-6345","cve":"CVE-2024-6345","title":"Remote Code Execution in pypa/setuptools","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6345","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6345","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6345","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6345","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6345","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-6345 cve-2024-6345 remote code execution in pypa/setuptools microsoft msrc msrc"},{"id":"CVE-2024-6387","cve":"CVE-2024-6387","title":"RedHat Openssh: CVE-2024-6387 Remote Code Execution Due To A Race Condition In Signal Handling","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6387","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6387","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6387","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.1,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6387","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6387","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-6387 cve-2024-6387 redhat openssh: cve-2024-6387 remote code execution due to a race condition in signal handling microsoft msrc msrc"},{"id":"CVE-2024-6484","cve":"CVE-2024-6484","title":"Rejected reason: This was not a security issue in Bootstrap. Bootstrap’s JavaScript is not intended to sanitize unsafe or intentionally dangerous HTML. As such, the reported behavi","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6484","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6484","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6484","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":3.3,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6484","added":"2026-04-01T12:01:21.343Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6484","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2024-6484 cve-2024-6484 rejected reason: this was not a security issue in bootstrap. bootstrap’s javascript is not intended to sanitize unsafe or intentionally dangerous html. as such, the reported behavi microsoft msrc msrc"},{"id":"CVE-2024-6485","cve":"CVE-2024-6485","title":"XSS in Bootstrap button component","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6485","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6485","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6485","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.4,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6485","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6485","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-6485 cve-2024-6485 xss in bootstrap button component microsoft msrc msrc"},{"id":"CVE-2024-6505","cve":"CVE-2024-6505","title":"Qemu-kvm: virtio-net: queue index out-of-bounds access in software rss","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6505","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6505","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6505","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6505","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6505","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-6505 cve-2024-6505 qemu-kvm: virtio-net: queue index out-of-bounds access in software rss microsoft msrc msrc"},{"id":"CVE-2024-6531","cve":"CVE-2024-6531","title":"Rejected reason: This was not a security issue in Bootstrap. Bootstrap’s JavaScript is not intended to sanitize unsafe or intentionally dangerous HTML. As such, the reported behavi","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6531","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6531","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6531","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.4,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6531","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6531","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-6531 cve-2024-6531 rejected reason: this was not a security issue in bootstrap. bootstrap’s javascript is not intended to sanitize unsafe or intentionally dangerous html. as such, the reported behavi microsoft msrc msrc"},{"id":"CVE-2024-6601","cve":"CVE-2024-6601","title":"A race condition could lead to a cross-origin container obtaining permissions of the top-level origin. This vulnerability affects Firefox &lt; 128, Firefox ESR &lt; 115.13, Thunder","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6601","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6601","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6601","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.7,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6601","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6601","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-6601 cve-2024-6601 a race condition could lead to a cross-origin container obtaining permissions of the top-level origin. this vulnerability affects firefox &lt; 128, firefox esr &lt; 115.13, thunder microsoft msrc msrc"},{"id":"CVE-2024-6603","cve":"CVE-2024-6603","title":"In an out-of-memory scenario an allocation could fail but free would have been called on the pointer afterwards leading to memory corruption. This vulnerability affects Firefox &lt","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6603","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6603","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6603","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.4,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6603","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6603","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-6603 cve-2024-6603 in an out-of-memory scenario an allocation could fail but free would have been called on the pointer afterwards leading to memory corruption. this vulnerability affects firefox &lt microsoft msrc msrc"},{"id":"CVE-2024-6604","cve":"CVE-2024-6604","title":"Memory safety bugs present in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12. Some of these bugs showed evidence of memory corruption and we presume that with enough effor","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6604","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6604","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6604","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6604","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6604","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-6604 cve-2024-6604 memory safety bugs present in firefox 127, firefox esr 115.12, and thunderbird 115.12. some of these bugs showed evidence of memory corruption and we presume that with enough effor microsoft msrc msrc"},{"id":"CVE-2024-6608","cve":"CVE-2024-6608","title":"It was possible to move the cursor using pointerlock from an iframe. This allowed moving the cursor outside of the viewport and the Firefox window. This vulnerability affects Firef","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6608","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6608","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6608","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.3,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6608","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6608","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-6608 cve-2024-6608 it was possible to move the cursor using pointerlock from an iframe. this allowed moving the cursor outside of the viewport and the firefox window. this vulnerability affects firef microsoft msrc msrc"},{"id":"CVE-2024-6610","cve":"CVE-2024-6610","title":"Form validation popups could capture escape key presses. Therefore, spamming form validation messages could be used to prevent users from exiting full-screen mode. This vulnerabili","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6610","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6610","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6610","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.3,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6610","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6610","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-6610 cve-2024-6610 form validation popups could capture escape key presses. therefore, spamming form validation messages could be used to prevent users from exiting full-screen mode. this vulnerabili microsoft msrc msrc"},{"id":"CVE-2024-6611","cve":"CVE-2024-6611","title":"A nested iframe, triggering a cross-site navigation, could send SameSite=Strict or Lax cookies. This vulnerability affects Firefox &lt; 128 and Thunderbird &lt; 128.","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6611","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6611","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6611","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6611","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6611","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2024-6611 cve-2024-6611 a nested iframe, triggering a cross-site navigation, could send samesite=strict or lax cookies. this vulnerability affects firefox &lt; 128 and thunderbird &lt; 128. microsoft msrc msrc"},{"id":"CVE-2024-6612","cve":"CVE-2024-6612","title":"CSP violations generated links in the console tab of the developer tools, pointing to the violating resource. This caused a DNS prefetch which leaked that a CSP violation happened.","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6612","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6612","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6612","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.3,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6612","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6612","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-6612 cve-2024-6612 csp violations generated links in the console tab of the developer tools, pointing to the violating resource. this caused a dns prefetch which leaked that a csp violation happened. microsoft msrc msrc"},{"id":"CVE-2024-6614","cve":"CVE-2024-6614","title":"The frame iterator could get stuck in a loop when encountering certain wasm frames leading to incorrect stack traces. This vulnerability affects Firefox &lt; 128 and Thunderbird &l","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6614","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6614","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6614","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.3,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6614","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6614","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-6614 cve-2024-6614 the frame iterator could get stuck in a loop when encountering certain wasm frames leading to incorrect stack traces. this vulnerability affects firefox &lt; 128 and thunderbird &l microsoft msrc msrc"},{"id":"CVE-2024-6615","cve":"CVE-2024-6615","title":"Memory safety bugs present in Firefox 127 and Thunderbird 127. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could ha","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6615","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6615","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6615","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6615","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6615","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-6615 cve-2024-6615 memory safety bugs present in firefox 127 and thunderbird 127. some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could ha microsoft msrc msrc"},{"id":"CVE-2024-6655","cve":"CVE-2024-6655","title":"Gtk3: gtk2: library injection from cwd","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6655","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6655","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6655","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6655","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6655","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-6655 cve-2024-6655 gtk3: gtk2: library injection from cwd microsoft msrc msrc"},{"id":"CVE-2024-6874","cve":"CVE-2024-6874","title":"macidn punycode buffer overread","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6874","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6874","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6874","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.3,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6874","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6874","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-6874 cve-2024-6874 macidn punycode buffer overread microsoft msrc msrc"},{"id":"CVE-2024-7264","cve":"CVE-2024-7264","title":"ASN.1 date parser overread","source_published":"2024-07-09","source_updated":"2026-04-01","source_doc_published":"2024-07-09","source_doc_updated":"2026-04-01","published":"2024-07-09","date":"2024-07-09","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7264","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7264","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7264","published":"2024-07-09","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-07-09","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7264","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7264","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-07-09","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-7264 cve-2024-7264 asn.1 date parser overread microsoft msrc msrc"},{"id":"CVE-2024-7344","cve":"CVE-2024-7344","title":"Cert CC: CVE-2024-7344 Howyar Taiwan Secure Boot Bypass","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7344","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7344","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7344","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.7,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7344","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7344","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-7344 cve-2024-7344 cert cc: cve-2024-7344 howyar taiwan secure boot bypass microsoft msrc msrc"},{"id":"CVE-2024-7348","cve":"CVE-2024-7348","title":"Mariner","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7348","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7348","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7348","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7348","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7348","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-7348 cve-2024-7348 mariner microsoft msrc msrc"},{"id":"CVE-2024-8096","cve":"CVE-2024-8096","title":"OCSP stapling bypass with GnuTLS","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-8096","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-8096","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-8096","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-8096","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-8096","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-8096 cve-2024-8096 ocsp stapling bypass with gnutls microsoft msrc msrc"},{"id":"CVE-2024-8612","cve":"CVE-2024-8612","title":"Qemu-kvm: information leak in virtio devices","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-8612","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-8612","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-8612","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":3.8,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-8612","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-8612","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2024-8612 cve-2024-8612 qemu-kvm: information leak in virtio devices microsoft msrc msrc"},{"id":"CVE-2024-8775","cve":"CVE-2024-8775","title":"Ansible-core: exposure of sensitive information in ansible vault files due to improper logging","source_published":"2024-09-10","source_updated":"2026-04-01","source_doc_published":"2024-09-10","source_doc_updated":"2026-04-01","published":"2024-09-10","date":"2024-09-10","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-8775","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-8775","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-8775","published":"2024-09-10","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2024-09-10","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-8775","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-8775","public_source":"MSRC","public_source_slug":"msrc","public_published":"2024-09-10","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-8775 cve-2024-8775 ansible-core: exposure of sensitive information in ansible vault files due to improper logging microsoft msrc msrc"},{"id":"CVE-2025-21171","cve":"CVE-2025-21171","title":".NET Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21171","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21171","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21171","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21171","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21171","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21171 cve-2025-21171 .net remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21172","cve":"CVE-2025-21172","title":".NET and Visual Studio Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21172","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21172","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21172","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21172","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21172","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21172 cve-2025-21172 .net and visual studio remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21173","cve":"CVE-2025-21173","title":".NET Elevation of Privilege Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21173","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21173","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21173","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.3,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21173","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21173","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21173 cve-2025-21173 .net elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21176","cve":"CVE-2025-21176","title":".NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21176","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21176","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21176","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21176","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21176","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21176 cve-2025-21176 .net, .net framework, and visual studio remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21178","cve":"CVE-2025-21178","title":"Visual Studio Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21178","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21178","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21178","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21178","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21178","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21178 cve-2025-21178 visual studio remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21185","cve":"CVE-2025-21185","title":"Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21185","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21185","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21185","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21185","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21185","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21185 cve-2025-21185 microsoft edge (chromium-based) elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21186","cve":"CVE-2025-21186","title":"Microsoft Access Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21186","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21186","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21186","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21186","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21186","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21186 cve-2025-21186 microsoft access remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21187","cve":"CVE-2025-21187","title":"Microsoft Power Automate Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21187","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21187","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21187","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21187","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21187","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21187 cve-2025-21187 microsoft power automate remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21189","cve":"CVE-2025-21189","title":"MapUrlToZone Security Feature Bypass Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21189","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21189","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21189","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.3,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21189","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21189","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21189 cve-2025-21189 mapurltozone security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21193","cve":"CVE-2025-21193","title":"Active Directory Federation Server Spoofing Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21193","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21193","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21193","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21193","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21193","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21193 cve-2025-21193 active directory federation server spoofing vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21202","cve":"CVE-2025-21202","title":"Windows Recovery Environment Agent Elevation of Privilege Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21202","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21202","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21202","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.1,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21202","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21202","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21202 cve-2025-21202 windows recovery environment agent elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21207","cve":"CVE-2025-21207","title":"Windows Connected Devices Platform Service (Cdpsvc) Denial of Service Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21207","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21207","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21207","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21207","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21207","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21207 cve-2025-21207 windows connected devices platform service (cdpsvc) denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21210","cve":"CVE-2025-21210","title":"Windows BitLocker Information Disclosure Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21210","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21210","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21210","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.2,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21210","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21210","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21210 cve-2025-21210 windows bitlocker information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21211","cve":"CVE-2025-21211","title":"Secure Boot Security Feature Bypass Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21211","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21211","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21211","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21211","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21211","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21211 cve-2025-21211 secure boot security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21213","cve":"CVE-2025-21213","title":"Secure Boot Security Feature Bypass Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21213","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21213","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21213","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.6,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21213","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21213","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21213 cve-2025-21213 secure boot security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21214","cve":"CVE-2025-21214","title":"Windows BitLocker Information Disclosure Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21214","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21214","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21214","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.2,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21214","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21214","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21214 cve-2025-21214 windows bitlocker information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21215","cve":"CVE-2025-21215","title":"Secure Boot Security Feature Bypass Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21215","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21215","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21215","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.6,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21215","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21215","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21215 cve-2025-21215 secure boot security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21217","cve":"CVE-2025-21217","title":"Windows NTLM Spoofing Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21217","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21217","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21217","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21217","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21217","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21217 cve-2025-21217 windows ntlm spoofing vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21218","cve":"CVE-2025-21218","title":"Windows Kerberos Denial of Service Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21218","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21218","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21218","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21218","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21218","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21218 cve-2025-21218 windows kerberos denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21219","cve":"CVE-2025-21219","title":"MapUrlToZone Security Feature Bypass Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21219","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21219","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21219","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.3,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21219","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21219","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21219 cve-2025-21219 mapurltozone security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21220","cve":"CVE-2025-21220","title":"Microsoft Message Queuing Information Disclosure Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21220","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21220","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21220","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21220","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21220","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21220 cve-2025-21220 microsoft message queuing information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21223","cve":"CVE-2025-21223","title":"Windows Telephony Service Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21223","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21223","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21223","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21223","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21223","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21223 cve-2025-21223 windows telephony service remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21224","cve":"CVE-2025-21224","title":"Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21224","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21224","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21224","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.1,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21224","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21224","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21224 cve-2025-21224 windows line printer daemon (lpd) service remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21225","cve":"CVE-2025-21225","title":"Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21225","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21225","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21225","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.9,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21225","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21225","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21225 cve-2025-21225 windows remote desktop gateway (rd gateway) denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21226","cve":"CVE-2025-21226","title":"Windows Digital Media Elevation of Privilege Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21226","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21226","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21226","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.6,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21226","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21226","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21226 cve-2025-21226 windows digital media elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21227","cve":"CVE-2025-21227","title":"Windows Digital Media Elevation of Privilege Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21227","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21227","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21227","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.6,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21227","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21227","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21227 cve-2025-21227 windows digital media elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21228","cve":"CVE-2025-21228","title":"Windows Digital Media Elevation of Privilege Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21228","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21228","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21228","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.6,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21228","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21228","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21228 cve-2025-21228 windows digital media elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21229","cve":"CVE-2025-21229","title":"Windows Digital Media Elevation of Privilege Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21229","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21229","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21229","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.6,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21229","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21229","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21229 cve-2025-21229 windows digital media elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21230","cve":"CVE-2025-21230","title":"Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21230","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21230","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21230","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21230","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21230","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21230 cve-2025-21230 microsoft message queuing (msmq) denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21231","cve":"CVE-2025-21231","title":"IP Helper Denial of Service Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21231","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21231","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21231","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21231","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21231","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21231 cve-2025-21231 ip helper denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21232","cve":"CVE-2025-21232","title":"Windows Digital Media Elevation of Privilege Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21232","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21232","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21232","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.6,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21232","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21232","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21232 cve-2025-21232 windows digital media elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21233","cve":"CVE-2025-21233","title":"Windows Telephony Service Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21233","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21233","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21233","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21233","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21233","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21233 cve-2025-21233 windows telephony service remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21234","cve":"CVE-2025-21234","title":"Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21234","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21234","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21234","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21234","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21234","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21234 cve-2025-21234 windows printworkflowusersvc elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21235","cve":"CVE-2025-21235","title":"Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21235","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21235","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21235","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21235","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21235","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21235 cve-2025-21235 windows printworkflowusersvc elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21236","cve":"CVE-2025-21236","title":"Windows Telephony Service Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21236","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21236","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21236","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21236","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21236","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21236 cve-2025-21236 windows telephony service remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21237","cve":"CVE-2025-21237","title":"Windows Telephony Service Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21237","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21237","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21237","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21237","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21237","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21237 cve-2025-21237 windows telephony service remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21238","cve":"CVE-2025-21238","title":"Windows Telephony Service Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21238","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21238","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21238","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21238","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21238","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21238 cve-2025-21238 windows telephony service remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21239","cve":"CVE-2025-21239","title":"Windows Telephony Service Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21239","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21239","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21239","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21239","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21239","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21239 cve-2025-21239 windows telephony service remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21240","cve":"CVE-2025-21240","title":"Windows Telephony Service Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21240","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21240","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21240","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21240","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21240","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21240 cve-2025-21240 windows telephony service remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21241","cve":"CVE-2025-21241","title":"Windows Telephony Service Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21241","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21241","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21241","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21241","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21241","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21241 cve-2025-21241 windows telephony service remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21242","cve":"CVE-2025-21242","title":"Windows Kerberos Information Disclosure Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21242","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21242","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21242","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.9,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21242","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21242","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21242 cve-2025-21242 windows kerberos information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21243","cve":"CVE-2025-21243","title":"Windows Telephony Service Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21243","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21243","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21243","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21243","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21243","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21243 cve-2025-21243 windows telephony service remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21244","cve":"CVE-2025-21244","title":"Windows Telephony Service Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21244","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21244","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21244","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21244","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21244","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21244 cve-2025-21244 windows telephony service remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21245","cve":"CVE-2025-21245","title":"Windows Telephony Service Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21245","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21245","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21245","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21245","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21245","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21245 cve-2025-21245 windows telephony service remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21246","cve":"CVE-2025-21246","title":"Windows Telephony Service Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21246","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21246","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21246","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21246","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21246","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21246 cve-2025-21246 windows telephony service remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21248","cve":"CVE-2025-21248","title":"Windows Telephony Service Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21248","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21248","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21248","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21248","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21248","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21248 cve-2025-21248 windows telephony service remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21249","cve":"CVE-2025-21249","title":"Windows Digital Media Elevation of Privilege Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21249","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21249","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21249","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.6,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21249","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21249","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21249 cve-2025-21249 windows digital media elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21250","cve":"CVE-2025-21250","title":"Windows Telephony Service Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21250","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21250","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21250","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21250","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21250","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21250 cve-2025-21250 windows telephony service remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21251","cve":"CVE-2025-21251","title":"Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21251","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21251","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21251","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21251","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21251","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21251 cve-2025-21251 microsoft message queuing (msmq) denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21252","cve":"CVE-2025-21252","title":"Windows Telephony Service Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21252","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21252","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21252","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21252","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21252","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21252 cve-2025-21252 windows telephony service remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21255","cve":"CVE-2025-21255","title":"Windows Digital Media Elevation of Privilege Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21255","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21255","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21255","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.6,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21255","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21255","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21255 cve-2025-21255 windows digital media elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21256","cve":"CVE-2025-21256","title":"Windows Digital Media Elevation of Privilege Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21256","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21256","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21256","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.6,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21256","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21256","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21256 cve-2025-21256 windows digital media elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21257","cve":"CVE-2025-21257","title":"Windows WLAN AutoConfig Service Information Disclosure Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21257","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21257","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21257","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21257","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21257","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21257 cve-2025-21257 windows wlan autoconfig service information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21258","cve":"CVE-2025-21258","title":"Windows Digital Media Elevation of Privilege Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21258","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21258","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21258","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.6,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21258","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21258","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21258 cve-2025-21258 windows digital media elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21260","cve":"CVE-2025-21260","title":"Windows Digital Media Elevation of Privilege Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21260","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21260","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21260","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.6,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21260","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21260","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21260 cve-2025-21260 windows digital media elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21261","cve":"CVE-2025-21261","title":"Windows Digital Media Elevation of Privilege Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21261","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21261","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21261","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.6,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21261","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21261","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21261 cve-2025-21261 windows digital media elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21262","cve":"CVE-2025-21262","title":"Microsoft Edge (Chromium-based) Spoofing Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21262","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21262","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21262","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.4,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21262","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21262","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21262 cve-2025-21262 microsoft edge (chromium-based) spoofing vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21263","cve":"CVE-2025-21263","title":"Windows Digital Media Elevation of Privilege Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21263","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21263","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21263","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.6,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21263","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21263","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21263 cve-2025-21263 windows digital media elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21265","cve":"CVE-2025-21265","title":"Windows Digital Media Elevation of Privilege Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21265","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21265","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21265","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.6,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21265","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21265","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21265 cve-2025-21265 windows digital media elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21266","cve":"CVE-2025-21266","title":"Windows Telephony Service Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21266","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21266","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21266","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21266","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21266","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21266 cve-2025-21266 windows telephony service remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21268","cve":"CVE-2025-21268","title":"MapUrlToZone Security Feature Bypass Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21268","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21268","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21268","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.3,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21268","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21268","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21268 cve-2025-21268 mapurltozone security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21269","cve":"CVE-2025-21269","title":"Windows HTML Platforms Security Feature Bypass Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21269","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21269","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21269","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.3,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21269","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21269","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21269 cve-2025-21269 windows html platforms security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21270","cve":"CVE-2025-21270","title":"Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21270","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21270","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21270","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21270","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21270","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21270 cve-2025-21270 microsoft message queuing (msmq) denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21271","cve":"CVE-2025-21271","title":"Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21271","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21271","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21271","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21271","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21271","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21271 cve-2025-21271 windows cloud files mini filter driver elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21272","cve":"CVE-2025-21272","title":"Windows COM Server Information Disclosure Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21272","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21272","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21272","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21272","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21272","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21272 cve-2025-21272 windows com server information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21273","cve":"CVE-2025-21273","title":"Windows Telephony Service Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21273","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21273","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21273","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21273","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21273","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21273 cve-2025-21273 windows telephony service remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21274","cve":"CVE-2025-21274","title":"Windows Event Tracing Denial of Service Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21274","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21274","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21274","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21274","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21274","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21274 cve-2025-21274 windows event tracing denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21275","cve":"CVE-2025-21275","title":"Windows App Package Installer Elevation of Privilege Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21275","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21275","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21275","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21275","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21275","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21275 cve-2025-21275 windows app package installer elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21276","cve":"CVE-2025-21276","title":"Windows MapUrlToZone Denial of Service Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21276","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21276","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21276","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21276","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21276","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21276 cve-2025-21276 windows mapurltozone denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21277","cve":"CVE-2025-21277","title":"Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21277","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21277","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21277","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21277","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21277","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21277 cve-2025-21277 microsoft message queuing (msmq) denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21278","cve":"CVE-2025-21278","title":"Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21278","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21278","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21278","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.2,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21278","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21278","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21278 cve-2025-21278 windows remote desktop gateway (rd gateway) denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21280","cve":"CVE-2025-21280","title":"Windows Virtual Trusted Platform Module Denial of Service Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21280","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21280","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21280","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21280","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21280","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21280 cve-2025-21280 windows virtual trusted platform module denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21281","cve":"CVE-2025-21281","title":"Microsoft COM for Windows Elevation of Privilege Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21281","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21281","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21281","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21281","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21281","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21281 cve-2025-21281 microsoft com for windows elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21282","cve":"CVE-2025-21282","title":"Windows Telephony Service Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21282","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21282","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21282","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21282","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21282","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21282 cve-2025-21282 windows telephony service remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21284","cve":"CVE-2025-21284","title":"Windows Virtual Trusted Platform Module Denial of Service Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21284","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21284","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21284","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21284","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21284","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21284 cve-2025-21284 windows virtual trusted platform module denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21285","cve":"CVE-2025-21285","title":"Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21285","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21285","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21285","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21285","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21285","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21285 cve-2025-21285 microsoft message queuing (msmq) denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21286","cve":"CVE-2025-21286","title":"Windows Telephony Service Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21286","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21286","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21286","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21286","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21286","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21286 cve-2025-21286 windows telephony service remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21287","cve":"CVE-2025-21287","title":"Windows Installer Elevation of Privilege Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21287","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21287","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21287","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21287","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21287","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21287 cve-2025-21287 windows installer elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21288","cve":"CVE-2025-21288","title":"Windows COM Server Information Disclosure Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21288","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21288","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21288","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21288","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21288","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21288 cve-2025-21288 windows com server information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21289","cve":"CVE-2025-21289","title":"Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21289","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21289","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21289","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21289","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21289","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21289 cve-2025-21289 microsoft message queuing (msmq) denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21290","cve":"CVE-2025-21290","title":"Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21290","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21290","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21290","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21290","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21290","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21290 cve-2025-21290 microsoft message queuing (msmq) denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21291","cve":"CVE-2025-21291","title":"Windows Direct Show Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21291","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21291","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21291","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21291","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21291","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21291 cve-2025-21291 windows direct show remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21292","cve":"CVE-2025-21292","title":"Windows Search Service Elevation of Privilege Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21292","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21292","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21292","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21292","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21292","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21292 cve-2025-21292 windows search service elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21293","cve":"CVE-2025-21293","title":"Active Directory Domain Services Elevation of Privilege Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21293","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21293","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21293","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21293","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21293","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21293 cve-2025-21293 active directory domain services elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21294","cve":"CVE-2025-21294","title":"Microsoft Digest Authentication Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21294","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21294","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21294","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.1,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21294","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21294","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21294 cve-2025-21294 microsoft digest authentication remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21295","cve":"CVE-2025-21295","title":"SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21295","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21295","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21295","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.1,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21295","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21295","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21295 cve-2025-21295 spnego extended negotiation (negoex) security mechanism remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21296","cve":"CVE-2025-21296","title":"BranchCache Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21296","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21296","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21296","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21296","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21296","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21296 cve-2025-21296 branchcache remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21297","cve":"CVE-2025-21297","title":"Windows Remote Desktop Services Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21297","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21297","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21297","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.1,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21297","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21297","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21297 cve-2025-21297 windows remote desktop services remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21298","cve":"CVE-2025-21298","title":"Windows OLE Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21298","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21298","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21298","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21298","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21298","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2025-21298 cve-2025-21298 windows ole remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21299","cve":"CVE-2025-21299","title":"Windows Kerberos Security Feature Bypass Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21299","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21299","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21299","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21299","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21299","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21299 cve-2025-21299 windows kerberos security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21300","cve":"CVE-2025-21300","title":"Windows Universal Plug and Play (UPnP) Device Host Denial of Service Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21300","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21300","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21300","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21300","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21300","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21300 cve-2025-21300 windows universal plug and play (upnp) device host denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21301","cve":"CVE-2025-21301","title":"Windows Geolocation Service Information Disclosure Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21301","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21301","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21301","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21301","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21301","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21301 cve-2025-21301 windows geolocation service information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21302","cve":"CVE-2025-21302","title":"Windows Telephony Service Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21302","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21302","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21302","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21302","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21302","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21302 cve-2025-21302 windows telephony service remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21303","cve":"CVE-2025-21303","title":"Windows Telephony Service Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21303","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21303","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21303","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21303","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21303","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21303 cve-2025-21303 windows telephony service remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21304","cve":"CVE-2025-21304","title":"Microsoft DWM Core Library Elevation of Privilege Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21304","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21304","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21304","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21304","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21304","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21304 cve-2025-21304 microsoft dwm core library elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21305","cve":"CVE-2025-21305","title":"Windows Telephony Service Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21305","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21305","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21305","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21305","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21305","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21305 cve-2025-21305 windows telephony service remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21306","cve":"CVE-2025-21306","title":"Windows Telephony Service Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21306","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21306","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21306","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21306","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21306","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21306 cve-2025-21306 windows telephony service remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21307","cve":"CVE-2025-21307","title":"Windows Reliable Multicast Transport Driver (RMCAST) Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21307","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21307","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21307","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21307","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21307","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2025-21307 cve-2025-21307 windows reliable multicast transport driver (rmcast) remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21308","cve":"CVE-2025-21308","title":"Windows Themes Spoofing Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21308","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21308","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21308","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21308","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21308","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21308 cve-2025-21308 windows themes spoofing vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21309","cve":"CVE-2025-21309","title":"Windows Remote Desktop Services Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21309","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21309","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21309","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.1,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21309","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21309","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21309 cve-2025-21309 windows remote desktop services remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21310","cve":"CVE-2025-21310","title":"Windows Digital Media Elevation of Privilege Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21310","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21310","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21310","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.6,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21310","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21310","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21310 cve-2025-21310 windows digital media elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21311","cve":"CVE-2025-21311","title":"Windows NTLM V1 Elevation of Privilege Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21311","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21311","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21311","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21311","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21311","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2025-21311 cve-2025-21311 windows ntlm v1 elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21312","cve":"CVE-2025-21312","title":"Windows Smart Card Reader Information Disclosure Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21312","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21312","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21312","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":2.4,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21312","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21312","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-21312 cve-2025-21312 windows smart card reader information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21313","cve":"CVE-2025-21313","title":"Windows Security Account Manager (SAM) Denial of Service Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21313","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21313","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21313","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21313","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21313","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21313 cve-2025-21313 windows security account manager (sam) denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21314","cve":"CVE-2025-21314","title":"Windows SmartScreen Spoofing Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21314","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21314","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21314","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21314","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21314","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21314 cve-2025-21314 windows smartscreen spoofing vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21315","cve":"CVE-2025-21315","title":"Microsoft Brokering File System Elevation of Privilege Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21315","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21315","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21315","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21315","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21315","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21315 cve-2025-21315 microsoft brokering file system elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21316","cve":"CVE-2025-21316","title":"Windows Kernel Memory Information Disclosure Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21316","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21316","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21316","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21316","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21316","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21316 cve-2025-21316 windows kernel memory information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21317","cve":"CVE-2025-21317","title":"Windows Kernel Memory Information Disclosure Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21317","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21317","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21317","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21317","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21317","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21317 cve-2025-21317 windows kernel memory information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21318","cve":"CVE-2025-21318","title":"Windows Kernel Memory Information Disclosure Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21318","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21318","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21318","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21318","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21318","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21318 cve-2025-21318 windows kernel memory information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21319","cve":"CVE-2025-21319","title":"Windows Kernel Memory Information Disclosure Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21319","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21319","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21319","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21319","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21319","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21319 cve-2025-21319 windows kernel memory information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21320","cve":"CVE-2025-21320","title":"Windows Kernel Memory Information Disclosure Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21320","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21320","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21320","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21320","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21320","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21320 cve-2025-21320 windows kernel memory information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21321","cve":"CVE-2025-21321","title":"Windows Kernel Memory Information Disclosure Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21321","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21321","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21321","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21321","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21321","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21321 cve-2025-21321 windows kernel memory information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21323","cve":"CVE-2025-21323","title":"Windows Kernel Memory Information Disclosure Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21323","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21323","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21323","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21323","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21323","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21323 cve-2025-21323 windows kernel memory information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21324","cve":"CVE-2025-21324","title":"Windows Digital Media Elevation of Privilege Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21324","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21324","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21324","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.6,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21324","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21324","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21324 cve-2025-21324 windows digital media elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21325","cve":"CVE-2025-21325","title":"Windows Secure Kernel Mode Elevation of Privilege Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21325","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21325","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21325","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21325","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21325","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21325 cve-2025-21325 windows secure kernel mode elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21326","cve":"CVE-2025-21326","title":"Internet Explorer Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21326","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21326","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21326","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21326","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21326","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21326 cve-2025-21326 internet explorer remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21327","cve":"CVE-2025-21327","title":"Windows Digital Media Elevation of Privilege Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21327","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21327","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21327","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.6,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21327","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21327","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21327 cve-2025-21327 windows digital media elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21328","cve":"CVE-2025-21328","title":"MapUrlToZone Security Feature Bypass Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21328","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21328","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21328","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.3,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21328","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21328","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21328 cve-2025-21328 mapurltozone security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21329","cve":"CVE-2025-21329","title":"MapUrlToZone Security Feature Bypass Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21329","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21329","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21329","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.3,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21329","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21329","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21329 cve-2025-21329 mapurltozone security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21330","cve":"CVE-2025-21330","title":"Windows Remote Desktop Services Denial of Service Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21330","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21330","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21330","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21330","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21330","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21330 cve-2025-21330 windows remote desktop services denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21331","cve":"CVE-2025-21331","title":"Windows Installer Elevation of Privilege Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21331","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21331","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21331","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.3,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21331","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21331","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21331 cve-2025-21331 windows installer elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21332","cve":"CVE-2025-21332","title":"MapUrlToZone Security Feature Bypass Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21332","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21332","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21332","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.3,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21332","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21332","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21332 cve-2025-21332 mapurltozone security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21333","cve":"CVE-2025-21333","title":"Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21333","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21333","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21333","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21333","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21333","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21333 cve-2025-21333 windows hyper-v nt kernel integration vsp elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21334","cve":"CVE-2025-21334","title":"Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21334","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21334","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21334","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21334","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21334","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21334 cve-2025-21334 windows hyper-v nt kernel integration vsp elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21335","cve":"CVE-2025-21335","title":"Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21335","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21335","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21335","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21335","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21335","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21335 cve-2025-21335 windows hyper-v nt kernel integration vsp elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21336","cve":"CVE-2025-21336","title":"Windows Cryptographic Information Disclosure Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21336","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21336","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21336","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.6,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21336","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21336","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21336 cve-2025-21336 windows cryptographic information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21338","cve":"CVE-2025-21338","title":"GDI+ Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21338","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21338","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21338","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21338","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21338","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21338 cve-2025-21338 gdi+ remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21339","cve":"CVE-2025-21339","title":"Windows Telephony Service Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21339","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21339","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21339","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21339","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21339","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21339 cve-2025-21339 windows telephony service remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21340","cve":"CVE-2025-21340","title":"Windows Virtualization-Based Security (VBS) Security Feature Bypass Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21340","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21340","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21340","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21340","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21340","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21340 cve-2025-21340 windows virtualization-based security (vbs) security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21341","cve":"CVE-2025-21341","title":"Windows Digital Media Elevation of Privilege Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21341","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21341","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21341","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.6,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21341","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21341","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21341 cve-2025-21341 windows digital media elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21343","cve":"CVE-2025-21343","title":"Windows Web Threat Defense User Service Information Disclosure Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21343","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21343","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21343","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21343","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21343","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21343 cve-2025-21343 windows web threat defense user service information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21344","cve":"CVE-2025-21344","title":"Microsoft SharePoint Server Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21344","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21344","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21344","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21344","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21344","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21344 cve-2025-21344 microsoft sharepoint server remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21345","cve":"CVE-2025-21345","title":"Microsoft Office Visio Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21345","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21345","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21345","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21345","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21345","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21345 cve-2025-21345 microsoft office visio remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21346","cve":"CVE-2025-21346","title":"Microsoft Office Security Feature Bypass Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21346","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21346","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21346","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21346","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21346","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21346 cve-2025-21346 microsoft office security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21348","cve":"CVE-2025-21348","title":"Microsoft SharePoint Server Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21348","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21348","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21348","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.2,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21348","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21348","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21348 cve-2025-21348 microsoft sharepoint server remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21354","cve":"CVE-2025-21354","title":"Microsoft Excel Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21354","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21354","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21354","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.4,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21354","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21354","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21354 cve-2025-21354 microsoft excel remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21356","cve":"CVE-2025-21356","title":"Microsoft Office Visio Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21356","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21356","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21356","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21356","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21356","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21356 cve-2025-21356 microsoft office visio remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21357","cve":"CVE-2025-21357","title":"Microsoft Outlook Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21357","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21357","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21357","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.7,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21357","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21357","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21357 cve-2025-21357 microsoft outlook remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21360","cve":"CVE-2025-21360","title":"Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21360","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21360","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21360","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21360","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21360","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21360 cve-2025-21360 microsoft autoupdate (mau) elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21361","cve":"CVE-2025-21361","title":"Microsoft Outlook Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21361","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21361","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21361","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21361","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21361","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21361 cve-2025-21361 microsoft outlook remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21362","cve":"CVE-2025-21362","title":"Microsoft Excel Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21362","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21362","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21362","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.4,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21362","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21362","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21362 cve-2025-21362 microsoft excel remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21363","cve":"CVE-2025-21363","title":"Microsoft Word Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21363","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21363","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21363","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21363","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21363","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21363 cve-2025-21363 microsoft word remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21364","cve":"CVE-2025-21364","title":"Microsoft Excel Security Feature Bypass Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21364","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21364","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21364","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21364","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21364","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21364 cve-2025-21364 microsoft excel security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21365","cve":"CVE-2025-21365","title":"Microsoft Office Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21365","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21365","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21365","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21365","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21365","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21365 cve-2025-21365 microsoft office remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21366","cve":"CVE-2025-21366","title":"Microsoft Access Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21366","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21366","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21366","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21366","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21366","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21366 cve-2025-21366 microsoft access remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21370","cve":"CVE-2025-21370","title":"Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21370","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21370","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21370","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21370","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21370","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21370 cve-2025-21370 windows virtualization-based security (vbs) enclave elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21372","cve":"CVE-2025-21372","title":"Microsoft Brokering File System Elevation of Privilege Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21372","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21372","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21372","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21372","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21372","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21372 cve-2025-21372 microsoft brokering file system elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21374","cve":"CVE-2025-21374","title":"Windows CSC Service Information Disclosure Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21374","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21374","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21374","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21374","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21374","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21374 cve-2025-21374 windows csc service information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21378","cve":"CVE-2025-21378","title":"Windows CSC Service Elevation of Privilege Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21378","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21378","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21378","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21378","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21378","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21378 cve-2025-21378 windows csc service elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21380","cve":"CVE-2025-21380","title":"Azure Marketplace SaaS Resources Information Disclosure Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21380","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21380","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21380","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21380","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21380","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21380 cve-2025-21380 azure marketplace saas resources information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21382","cve":"CVE-2025-21382","title":"Windows Graphics Component Elevation of Privilege Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21382","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21382","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21382","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21382","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21382","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21382 cve-2025-21382 windows graphics component elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21385","cve":"CVE-2025-21385","title":"Microsoft Purview Information Disclosure Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21385","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21385","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21385","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21385","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21385","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21385 cve-2025-21385 microsoft purview information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21389","cve":"CVE-2025-21389","title":"Windows Universal Plug and Play (UPnP) Device Host Denial of Service Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21389","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21389","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21389","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21389","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21389","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21389 cve-2025-21389 windows universal plug and play (upnp) device host denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21393","cve":"CVE-2025-21393","title":"Microsoft SharePoint Server Spoofing Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21393","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21393","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21393","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.3,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21393","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21393","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21393 cve-2025-21393 microsoft sharepoint server spoofing vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21395","cve":"CVE-2025-21395","title":"Microsoft Access Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21395","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21395","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21395","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21395","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21395","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21395 cve-2025-21395 microsoft access remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21396","cve":"CVE-2025-21396","title":"Microsoft Account Elevation of Privilege Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21396","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21396","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21396","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.2,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21396","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21396","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21396 cve-2025-21396 microsoft account elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21399","cve":"CVE-2025-21399","title":"Microsoft Edge (Chromium-based) Update Elevation of Privilege Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21399","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21399","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21399","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.4,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21399","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21399","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21399 cve-2025-21399 microsoft edge (chromium-based) update elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21402","cve":"CVE-2025-21402","title":"Microsoft Office OneNote Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21402","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21402","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21402","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21402","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21402","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21402 cve-2025-21402 microsoft office onenote remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21403","cve":"CVE-2025-21403","title":"On-Premises Data Gateway Information Disclosure Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21403","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21403","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21403","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.4,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21403","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21403","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-21403 cve-2025-21403 on-premises data gateway information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21405","cve":"CVE-2025-21405","title":"Visual Studio Elevation of Privilege Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21405","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21405","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21405","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.3,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21405","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21405","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21405 cve-2025-21405 visual studio elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21409","cve":"CVE-2025-21409","title":"Windows Telephony Service Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21409","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21409","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21409","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21409","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21409","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21409 cve-2025-21409 windows telephony service remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21411","cve":"CVE-2025-21411","title":"Windows Telephony Service Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21411","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21411","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21411","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21411","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21411","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21411 cve-2025-21411 windows telephony service remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21413","cve":"CVE-2025-21413","title":"Windows Telephony Service Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21413","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21413","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21413","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21413","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21413","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21413 cve-2025-21413 windows telephony service remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21415","cve":"CVE-2025-21415","title":"Azure AI Face Service Elevation of Privilege Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21415","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21415","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21415","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.9,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21415","added":"2026-04-01T00:00:00.000Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21415","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2025-21415 cve-2025-21415 azure ai face service elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21417","cve":"CVE-2025-21417","title":"Windows Telephony Service Remote Code Execution Vulnerability","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21417","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21417","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21417","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21417","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21417","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21417 cve-2025-21417 windows telephony service remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21613","cve":"CVE-2025-21613","title":"go-git has an Argument Injection via the URL field","source_published":"2025-01-14","source_updated":"2026-04-01","source_doc_published":"2025-01-14","source_doc_updated":"2026-04-01","published":"2025-01-14","date":"2025-01-14","updated":"2026-04-01","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21613","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21613","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21613","published":"2025-01-14","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.1,"cve_published":null,"cve_updated":null,"published_at":"2025-01-14","updated_at":"2026-04-01","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21613","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21613","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-01-14","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21613 cve-2025-21613 go-git has an argument injection via the url field microsoft msrc msrc"},{"id":"CVE-2026-21711","cve":"CVE-2026-21711","title":"Mariner","source_published":"2026-03-10","source_updated":"2026-04-06","source_doc_published":"2026-03-10","source_doc_updated":"2026-04-06","published":"2026-03-30","date":"2026-03-30","updated":"2026-04-01","date_basis":"msrc_cve","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://www.cve.org/CVERecord?id=CVE-2026-21711","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21711","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21711","published":"2026-03-10","updated":"2026-04-06","checked_at":"2026-04-13T04:00:46.889Z","status_ok":null,"source_kind":"vendor","confidence":0.92},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-21711","published":"2026-03-30","updated":"2026-04-01","checked_at":"2026-04-13T04:00:46.889Z","status_ok":true,"source_kind":"msrc_cve","confidence":0.99}],"exploited":false,"severity":"medium","cvss":5.3,"cve_published":"2026-03-30","cve_updated":"2026-04-01","published_at":"2026-03-30","updated_at":"2026-04-01","link_checked_at":"2026-04-13T04:00:46.889Z","sourceUrl":"https://www.cve.org/CVERecord?id=CVE-2026-21711","added":"2026-04-01T09:01:05.879Z","public_url":"https://www.cve.org/CVERecord?id=CVE-2026-21711","public_source":"CVE","public_source_slug":"cve","public_published":"2026-03-30","public_updated":"2026-04-01","public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2026-21711 cve-2026-21711 mariner microsoft cve msrc","source_url_repaired_from":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21711","source_date":"2026-03-10"},{"id":"CVE:CVE-2026-5281","cve":"CVE-2026-5281","title":"Google Dawn Use-After-Free Vulnerability","date":"2026-04-01","vendor":"Google","product":"Dawn","source":"CISA-KEV","cisa_url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog","source_url":"https://nvd.nist.gov/vuln/detail/CVE-2026-5281","severity":"high","ransomware":"Unknown","cvss":null,"exploited":true,"published":"2026-04-01","updated":null,"source_published":"2026-04-01","source_updated":null,"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"candidates":[{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-5281","published":"2026-04-01","updated":"2026-04-01","checked_at":null,"status_ok":null,"source_kind":"nvd","confidence":0.8}],"date_basis":"nvd","link_checked_at":null,"sourceUrl":"https://nvd.nist.gov/vuln/detail/CVE-2026-5281","added":"2026-04-01T00:00:00.000Z","public_url":"https://nvd.nist.gov/vuln/detail/CVE-2026-5281","public_source":"CVE","public_source_slug":"cve","public_published":"2026-04-01","public_updated":null,"public_display_date":"2026-04-01","public_sort_date":"2026-04-01","public_period_date":"2026-04-01","severity_norm":"high","vendor_slug":"google","search_text":"cve:cve-2026-5281 cve-2026-5281 google dawn use-after-free vulnerability google dawn cve cisa-kev unknown"},{"id":"BSI:WID-SEC-2022-1835","cve":"","title":"Red Hat Enterprise Linux (python-pillow): Mehrere Schwachstellen","date":"2026-03-31","published":"2026-03-31","updated":null,"source_published":"2026-03-31","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1835","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1835","published":"2026-03-31","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-01T09:00:59.094Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1835","added":"2026-03-31T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1835","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-31","public_updated":null,"public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2022-1835 red hat enterprise linux (python-pillow): mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2024-0184","cve":"","title":"Red Hat Enterprise Linux (pillow): Schwachstelle ermöglicht Denial of Service","date":"2026-03-31","published":"2026-03-31","updated":null,"source_published":"2026-03-31","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0184","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0184","published":"2026-03-31","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-01T09:00:59.094Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0184","added":"2026-03-31T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0184","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-31","public_updated":null,"public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2024-0184 red hat enterprise linux (pillow): schwachstelle ermöglicht denial of service bsi bsi"},{"id":"BSI:WID-SEC-2024-0337","cve":"","title":"Red Hat Enterprise Linux (Pillow): Schwachstelle ermöglicht Codeausführung","date":"2026-03-31","published":"2026-03-31","updated":null,"source_published":"2026-03-31","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0337","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0337","published":"2026-03-31","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-01T09:00:59.094Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0337","added":"2026-03-31T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0337","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-31","public_updated":null,"public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2024-0337 red hat enterprise linux (pillow): schwachstelle ermöglicht codeausführung bsi bsi"},{"id":"BSI:WID-SEC-2025-1522","cve":"","title":"Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-03-31","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1522","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-03-31T09:00:45.223Z","published":"2026-03-31","source_published":"2026-03-31","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1522","published":"2026-03-31","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-03-25","source_doc_updated":"2026-03-25","cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1522","added":"2026-03-31T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1522","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-31","public_updated":null,"public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2025-1522 linux kernel: mehrere schwachstellen ermöglichen denial of service bsi bsi"},{"id":"BSI:WID-SEC-2025-1569","cve":"","title":"Oracle Java SE: Mehrere Schwachstellen","date":"2026-03-31","published":"2026-03-31","updated":null,"source_published":"2026-03-31","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1569","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1569","published":"2026-03-31","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-01T09:00:59.094Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1569","added":"2026-03-31T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1569","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-31","public_updated":null,"public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2025-1569 oracle java se: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2025-1653","cve":"","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-03-31","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1653","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-03-31T09:00:45.223Z","published":"2026-03-31","source_published":"2026-03-31","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1653","published":"2026-03-31","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-03-25","source_doc_updated":"2026-03-25","cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1653","added":"2026-03-31T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1653","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-31","public_updated":null,"public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2025-1653 linux kernel: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2025-1665","cve":"","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-03-31","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1665","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-03-31T09:00:45.223Z","published":"2026-03-31","source_published":"2026-03-31","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1665","published":"2026-03-31","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-03-25","source_doc_updated":"2026-03-25","cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1665","added":"2026-03-31T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1665","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-31","public_updated":null,"public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2025-1665 linux kernel: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2025-1858","cve":"","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-03-31","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1858","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-03-31T09:00:45.223Z","published":"2026-03-31","source_published":"2026-03-31","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1858","published":"2026-03-31","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1858","added":"2026-03-31T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1858","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-31","public_updated":null,"public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2025-1858 linux kernel: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2025-1898","cve":"","title":"Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service und Privilegieneskalation","date":"2026-03-31","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1898","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-03-31T09:00:45.223Z","published":"2026-03-31","source_published":"2026-03-31","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1898","published":"2026-03-31","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1898","added":"2026-03-31T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1898","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-31","public_updated":null,"public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2025-1898 linux kernel: mehrere schwachstellen ermöglichen denial of service und privilegieneskalation bsi bsi"},{"id":"BSI:WID-SEC-2025-1988","cve":"","title":"Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-03-31","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1988","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-03-31T09:00:45.223Z","published":"2026-03-31","source_published":"2026-03-31","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1988","published":"2026-03-31","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1988","added":"2026-03-31T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1988","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-31","public_updated":null,"public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2025-1988 linux kernel: mehrere schwachstellen ermöglichen denial of service bsi bsi"},{"id":"BSI:WID-SEC-2025-2077","cve":"","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-03-31","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2077","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-03-31T09:00:45.223Z","published":"2026-03-31","source_published":"2026-03-31","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2077","published":"2026-03-31","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2077","added":"2026-03-31T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2077","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-31","public_updated":null,"public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2077 linux kernel: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2025-2132","cve":"","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-03-31","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2132","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-03-31T09:00:45.223Z","published":"2026-03-31","source_published":"2026-03-31","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2132","published":"2026-03-31","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2132","added":"2026-03-31T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2132","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-31","public_updated":null,"public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2132 linux kernel: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2025-2134","cve":"","title":"Red Hat Enterprise Linux (Developer Hub): Schwachstelle ermöglicht Denial of Service","date":"2026-03-31","published":"2026-03-31","updated":null,"source_published":"2026-03-31","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2134","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2134","published":"2026-03-31","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-03-31T09:00:45.223Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2134","added":"2026-03-31T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2134","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-31","public_updated":null,"public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2134 red hat enterprise linux (developer hub): schwachstelle ermöglicht denial of service bsi bsi"},{"id":"BSI:WID-SEC-2025-2251","cve":"","title":"Red Hat OpenShift GitOps: Mehrere Schwachstellen","date":"2026-03-31","published":"2026-03-31","updated":null,"source_published":"2026-03-31","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2251","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2251","published":"2026-03-31","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-03-31T09:00:45.223Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2251","added":"2026-03-31T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2251","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-31","public_updated":null,"public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2251 red hat openshift gitops: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2025-2394","cve":"","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-03-31","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2394","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-03-31T09:00:45.223Z","published":"2026-03-31","source_published":"2026-03-31","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2394","published":"2026-03-31","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2394","added":"2026-03-31T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2394","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-31","public_updated":null,"public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2394 linux kernel: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2025-2432","cve":"","title":"Red Hat Ansible Automation Platform: Mehrere Schwachstellen","date":"2026-03-31","published":"2026-03-31","updated":null,"source_published":"2026-03-31","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2432","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2432","published":"2026-03-31","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-03-31T09:00:45.223Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2432","added":"2026-03-31T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2432","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-31","public_updated":null,"public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2432 red hat ansible automation platform: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2025-2657","cve":"","title":"WebKitGTK: Mehrere Schwachstellen","date":"2026-03-31","published":"2026-03-31","updated":null,"source_published":"2026-03-31","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2657","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-01T09:00:59.094Z","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2657","published":"2026-03-31","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2657","added":"2026-03-31T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2657","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-31","public_updated":null,"public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2657 webkitgtk: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2025-2751","cve":"","title":"WebKitGTK: Mehrere Schwachstellen","date":"2026-03-31","published":"2026-03-31","updated":null,"source_published":"2026-03-31","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2751","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2751","published":"2026-03-31","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-01T09:00:59.094Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2751","added":"2026-03-31T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2751","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-31","public_updated":null,"public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2751 webkitgtk: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2025-2759","cve":"","title":"IBM WebSphere Application Server: Schwachstelle ermöglicht Cross-Site Scripting","date":"2026-03-31","published":"2026-03-31","updated":null,"source_published":"2026-03-31","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2759","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2759","published":"2026-03-31","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-03-31T09:00:45.223Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2759","added":"2026-03-31T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2759","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-31","public_updated":null,"public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2759 ibm websphere application server: schwachstelle ermöglicht cross-site scripting bsi bsi"},{"id":"BSI:WID-SEC-2025-2798","cve":"","title":"Red Hat OpenShift Service Mesh: Mehrere Schwachstellen","date":"2026-03-31","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2798","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-03-31T09:00:45.223Z","published":"2026-03-31","source_published":"2026-03-31","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2798","published":"2026-03-31","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2798","added":"2026-03-31T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2798","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-31","public_updated":null,"public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2025-2798 red hat openshift service mesh: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0148","cve":"","title":"ImageMagick: Mehrere Schwachstellen","date":"2026-03-31","published":"2026-03-31","updated":null,"source_published":"2026-03-31","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0148","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0148","published":"2026-03-31","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-01T09:00:59.094Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0148","added":"2026-03-31T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0148","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-31","public_updated":null,"public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0148 imagemagick: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0184","cve":"","title":"Linux Kernel: Schwachstelle ermöglicht Denial of Service","date":"2026-03-31","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0184","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-01T09:00:59.094Z","published":"2026-03-31","source_published":"2026-03-31","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0184","published":"2026-03-31","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-03-25","source_doc_updated":"2026-03-25","cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0184","added":"2026-03-31T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0184","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-31","public_updated":null,"public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0184 linux kernel: schwachstelle ermöglicht denial of service bsi bsi"},{"id":"BSI:WID-SEC-2026-0194","cve":"","title":"Linux Kernel: Schwachstelle ermöglicht Denial of Service","date":"2026-03-31","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0194","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-01T09:00:59.094Z","published":"2026-03-31","source_published":"2026-03-31","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0194","published":"2026-03-31","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":"2026-03-25","source_doc_updated":"2026-03-25","cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0194","added":"2026-03-31T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0194","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-31","public_updated":null,"public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0194 linux kernel: schwachstelle ermöglicht denial of service bsi bsi"},{"id":"BSI:WID-SEC-2026-0195","cve":"","title":"Red Hat Enterprise Linux (pcs / tornado): Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-03-31","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0195","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-01T09:00:59.094Z","published":"2026-03-31","source_published":"2026-03-31","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0195","published":"2026-03-31","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0195","added":"2026-03-31T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0195","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-31","public_updated":null,"public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0195 red hat enterprise linux (pcs / tornado): mehrere schwachstellen ermöglichen denial of service bsi bsi"},{"id":"BSI:WID-SEC-2026-0199","cve":"","title":"Red Hat OpenShift Pipelines Operator (Fulcio): Schwachstelle ermöglicht Denial of Service","date":"2026-03-31","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0199","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-04-01T09:00:59.094Z","published":"2026-03-31","source_published":"2026-03-31","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0199","published":"2026-03-31","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0199","added":"2026-03-31T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0199","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-31","public_updated":null,"public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0199 red hat openshift pipelines operator (fulcio): schwachstelle ermöglicht denial of service bsi bsi"},{"id":"BSI:WID-SEC-2026-0343","cve":"","title":"Fortinet FortiClientEMS: Schwachstelle ermöglicht Codeausführung","date":"2026-03-31","published":"2026-03-31","updated":null,"source_published":"2026-03-31","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0343","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0343","published":"2026-03-31","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-01T09:00:59.094Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0343","added":"2026-03-31T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0343","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-31","public_updated":null,"public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0343 fortinet forticlientems: schwachstelle ermöglicht codeausführung bsi bsi"},{"id":"BSI:WID-SEC-2026-0916","cve":"","title":"Apache Airflow: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen","date":"2026-03-31","published":"2026-03-31","updated":null,"source_published":"2026-03-31","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0916","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0916","published":"2026-03-31","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-01T09:00:59.094Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0916","added":"2026-03-31T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0916","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-31","public_updated":null,"public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0916 apache airflow: schwachstelle ermöglicht umgehen von sicherheitsvorkehrungen bsi bsi"},{"id":"BSI:WID-SEC-2026-0918","cve":"","title":"GNU libc: Schwachstelle ermöglicht Denial of Service","date":"2026-03-31","published":"2026-03-31","updated":null,"source_published":"2026-03-31","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0918","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0918","published":"2026-03-31","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-01T09:00:59.094Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0918","added":"2026-03-31T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0918","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-31","public_updated":null,"public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0918 gnu libc: schwachstelle ermöglicht denial of service bsi bsi"},{"id":"BSI:WID-SEC-2026-0919","cve":"","title":"Kyverno: Schwachstelle ermöglicht Offenlegung von Informationen","date":"2026-03-31","published":"2026-03-31","updated":null,"source_published":"2026-03-31","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0919","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0919","published":"2026-03-31","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-01T09:00:59.094Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0919","added":"2026-03-31T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0919","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-31","public_updated":null,"public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0919 kyverno: schwachstelle ermöglicht offenlegung von informationen bsi bsi"},{"id":"BSI:WID-SEC-2026-0920","cve":"","title":"MongoDB: Schwachstelle ermöglicht Denial of Service","date":"2026-03-31","published":"2026-03-31","updated":null,"source_published":"2026-03-31","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0920","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0920","published":"2026-03-31","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-01T09:00:59.094Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0920","added":"2026-03-31T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0920","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-31","public_updated":null,"public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0920 mongodb: schwachstelle ermöglicht denial of service bsi bsi"},{"id":"BSI:WID-SEC-2026-0921","cve":"","title":"Symantec Data Loss Prevention: Schwachstelle ermöglicht Privilegieneskalation","date":"2026-03-31","published":"2026-03-31","updated":null,"source_published":"2026-03-31","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0921","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0921","published":"2026-03-31","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-01T09:00:59.094Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0921","added":"2026-03-31T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0921","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-31","public_updated":null,"public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0921 symantec data loss prevention: schwachstelle ermöglicht privilegieneskalation bsi bsi"},{"id":"BSI:WID-SEC-2026-0923","cve":"","title":"libarchive: Schwachstelle ermöglicht Codeausführung","date":"2026-03-31","published":"2026-03-31","updated":null,"source_published":"2026-03-31","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0923","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0923","published":"2026-03-31","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-01T09:00:59.094Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0923","added":"2026-03-31T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0923","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-31","public_updated":null,"public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0923 libarchive: schwachstelle ermöglicht codeausführung bsi bsi"},{"id":"BSI:WID-SEC-2026-0925","cve":"","title":"Synacor Zimbra: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen","date":"2026-03-31","published":"2026-03-31","updated":null,"source_published":"2026-03-31","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0925","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0925","published":"2026-03-31","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-01T09:00:59.094Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0925","added":"2026-03-31T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0925","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-31","public_updated":null,"public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0925 synacor zimbra: schwachstelle ermöglicht umgehen von sicherheitsvorkehrungen bsi bsi"},{"id":"BSI:WID-SEC-2026-0926","cve":"","title":"ESET PROTECT: Schwachstelle ermöglicht Offenlegung von Informationen","date":"2026-03-31","published":"2026-03-31","updated":null,"source_published":"2026-03-31","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0926","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0926","published":"2026-03-31","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-01T09:00:59.094Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0926","added":"2026-03-31T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0926","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-31","public_updated":null,"public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0926 eset protect: schwachstelle ermöglicht offenlegung von informationen bsi bsi"},{"id":"BSI:WID-SEC-2026-0928","cve":"","title":"Checkmk: Mehrere Schwachstellen ermöglichen Cross-Site Scripting","date":"2026-03-31","published":"2026-03-31","updated":null,"source_published":"2026-03-31","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0928","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0928","published":"2026-03-31","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-04-01T09:00:59.094Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0928","added":"2026-03-31T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0928","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-31","public_updated":null,"public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0928 checkmk: mehrere schwachstellen ermöglichen cross-site scripting bsi bsi"},{"id":"BSI:WID-SEC-W-2024-0913","cve":"CVE-2023-52642","title":"Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2024-04-16","published":"2024-04-16","updated":"2026-03-31","source_published":"2024-04-16","source_updated":"2026-03-31","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://lore.kernel.org/linux-cve-announce/2024041701-CVE-2023-52643-8834@gregkh/T/","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0913.json","summary":"WID-SEC-W-2024-0913 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0913","summary":"WID-SEC-2024-0913 - Portal Version","category":"self"},{"url":"https://lore.kernel.org/linux-cve-announce/2024041701-CVE-2023-52643-8834@gregkh/T/","summary":"Linux Kernel CVE Announcements vom 2024-04-16","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024041701-CVE-2024-26818-d65b@gregkh/T/","summary":"Linux Kernel CVE Announcements vom 2024-04-16","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024041701-CVE-2024-26819-1731@gregkh/T/","summary":"Linux Kernel CVE Announcements vom 2024-04-16","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024041701-CVE-2024-26820-fc5a@gregkh/T/","summary":"Linux Kernel CVE Announcements vom 2024-04-16","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024041702-CVE-2024-26821-de6b@gregkh/T/","summary":"Linux Kernel CVE Announcements vom 2024-04-16","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024041702-CVE-2024-26822-04b5@gregkh/T/","summary":"Linux Kernel CVE Announcements vom 2024-04-16","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024041702-CVE-2024-26823-0e52@gregkh/T/","summary":"Linux Kernel CVE Announcements vom 2024-04-16","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024041702-CVE-2024-26824-98e1@gregkh/T/","summary":"Linux Kernel CVE Announcements vom 2024-04-16","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024041702-CVE-2024-26825-408e@gregkh/T/","summary":"Linux Kernel CVE Announcements vom 2024-04-16","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024041703-CVE-2024-26827-67c1@gregkh/T","summary":"Linux Kernel CVE Announcements vom 2024-04-16","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024041703-CVE-2024-26828-b2be@gregkh/T/","summary":"Linux Kernel CVE Announcements vom 2024-04-16","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024041703-CVE-2024-26830-5bc0@gregkh/T/","summary":"Linux Kernel CVE Announcements vom 2024-04-16","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024041704-CVE-2024-26831-2e6e@gregkh/T/","summary":"Linux Kernel CVE Announcements vom 2024-04-16","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024041758-CVE-2023-52642-3261@gregkh/T/","summary":"Linux Kernel CVE Announcements vom 2024-04-16","category":"external"},{"url":"https://lists.debian.org/debian-security-announce/2024/msg00090.html","summary":"Debian Security Advisory DSA-5681 vom 2024-05-06","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6767-1","summary":"Ubuntu Security Notice USN-6767-1 vom 2024-05-07","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6766-1","summary":"Ubuntu Security Notice USN-6766-1 vom 2024-05-07","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6767-2","summary":"Ubuntu Security Notice USN-6767-2 vom 2024-05-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-May/018528.html","summary":"SUSE Security Update SUSE-SU-2024:1644-1 vom 2024-05-14","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6766-2","summary":"Ubuntu Security Notice USN-6766-2 vom 2024-05-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-May/018538.html","summary":"SUSE Security Update SUSE-SU-2024:1659-1 vom 2024-05-15","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6766-3","summary":"Ubuntu Security Notice USN-6766-3 vom 2024-05-20","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6795-1","summary":"Ubuntu Security Notice USN-6795-1 vom 2024-05-28","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:3460","summary":"Red Hat Security Advisory RHSA-2024:3460 vom 2024-05-29","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:3461","summary":"Red Hat Security Advisory RHSA-2024:3461 vom 2024-05-29","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6820-1","summary":"Ubuntu Security Notice USN-6820-1 vom 2024-06-08","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6821-1","summary":"Ubuntu Security Notice USN-6821-1 vom 2024-06-08","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6821-2","summary":"Ubuntu Security Notice USN-6821-2 vom 2024-06-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018685.html","summary":"SUSE Security Update SUSE-SU-2024:1979-1 vom 2024-06-11","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6828-1","summary":"Ubuntu Security Notice USN-6828-1 vom 2024-06-11","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6820-2","summary":"Ubuntu Security Notice USN-6820-2 vom 2024-06-11","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018700.html","summary":"SUSE Security Update SUSE-SU-2024:1983-1 vom 2024-06-11","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6821-3","summary":"Ubuntu Security Notice USN-6821-3 vom 2024-06-11","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018706.html","summary":"SUSE Security Update SUSE-SU-2024:2008-1 vom 2024-06-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018710.html","summary":"SUSE Security Update SUSE-SU-2024:2011-1 vom 2024-06-12","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6821-4","summary":"Ubuntu Security Notice USN-6821-4 vom 2024-06-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018783.html","summary":"SUSE Security Update SUSE-SU-2024:2135-1 vom 2024-06-21","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018807.html","summary":"SUSE Security Update SUSE-SU-2024:2184-1 vom 2024-06-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018809.html","summary":"SUSE Security Update SUSE-SU-2024:2185-1 vom 2024-06-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018808.html","summary":"SUSE Security Update SUSE-SU-2024:2183-1 vom 2024-06-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018811.html","summary":"SUSE Security Update SUSE-SU-2024:2189-1 vom 2024-06-25","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html","summary":"Debian Security Advisory DLA-3842 vom 2024-06-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018819.html","summary":"SUSE Security Update SUSE-SU-2024:2190-1 vom 2024-06-25","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html","summary":"Debian Security Advisory DLA-3840 vom 2024-06-27","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4211","summary":"Red Hat Security Advisory RHSA-2024:4211 vom 2024-07-02","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-4211.html","summary":"Oracle Linux Security Advisory ELSA-2024-4211 vom 2024-07-03","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6871-1","summary":"Ubuntu Security Notice USN-6871-1 vom 2024-07-04","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4352","summary":"Red Hat Security Advisory RHSA-2024:4352 vom 2024-07-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018882.html","summary":"SUSE Security Update SUSE-SU-2024:2335-1 vom 2024-07-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018883.html","summary":"SUSE Security Update SUSE-SU-2024:2326-1 vom 2024-07-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018889.html","summary":"SUSE Security Update SUSE-SU-2024:2338-1 vom 2024-07-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html","summary":"SUSE Security Update SUSE-SU-2024:2337-1 vom 2024-07-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018890.html","summary":"SUSE Security Update SUSE-SU-2024:2341-1 vom 2024-07-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018895.html","summary":"SUSE Security Update SUSE-SU-2024:2373-1 vom 2024-07-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018899.html","summary":"SUSE Security Update SUSE-SU-2024:2357-1 vom 2024-07-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018900.html","summary":"SUSE Security Update SUSE-SU-2024:2368-1 vom 2024-07-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018891.html","summary":"SUSE Security Update SUSE-SU-2024:2351-1 vom 2024-07-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018896.html","summary":"SUSE Security Update SUSE-SU-2024:2369-1 vom 2024-07-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018905.html","summary":"SUSE Security Update SUSE-SU-2024:2362-1 vom 2024-07-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018893.html","summary":"SUSE Security Update SUSE-SU-2024:2343-1 vom 2024-07-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018894.html","summary":"SUSE Security Update SUSE-SU-2024:2342-1 vom 2024-07-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018892.html","summary":"SUSE Security Update SUSE-SU-2024:2344-1 vom 2024-07-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018898.html","summary":"SUSE Security Update SUSE-SU-2024:2358-1 vom 2024-07-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018921.html","summary":"SUSE Security Update SUSE-SU-2024:2384-1 vom 2024-07-10","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6892-1","summary":"Ubuntu Security Notice USN-6892-1 vom 2024-07-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018917.html","summary":"SUSE Security Update SUSE-SU-2024:2382-1 vom 2024-07-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4321","summary":"Red Hat Security Advisory RHSA-2024:4321 vom 2024-07-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018923.html","summary":"SUSE Security Update SUSE-SU-2024:2396-1 vom 2024-07-11","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018926.html","summary":"SUSE Security Update SUSE-SU-2024:2410-1 vom 2024-07-11","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018924.html","summary":"SUSE Security Update SUSE-SU-2024:2407-1 vom 2024-07-11","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6895-1","summary":"Ubuntu Security Notice USN-6895-1 vom 2024-07-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018943.html","summary":"SUSE Security Update SUSE-SU-2024:2472-1 vom 2024-07-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018947.html","summary":"SUSE Security Update SUSE-SU-2024:2446-1 vom 2024-07-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018948.html","summary":"SUSE Security Update SUSE-SU-2024:2437-1 vom 2024-07-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018941.html","summary":"SUSE Security Update SUSE-SU-2024:2474-1 vom 2024-07-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018945.html","summary":"SUSE Security Update SUSE-SU-2024:2448-1 vom 2024-07-12","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6896-1","summary":"Ubuntu Security Notice USN-6896-1 vom 2024-07-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018946.html","summary":"SUSE Security Update SUSE-SU-2024:2447-1 vom 2024-07-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018942.html","summary":"SUSE Security Update SUSE-SU-2024:2473-1 vom 2024-07-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018944.html","summary":"SUSE Security Update SUSE-SU-2024:2449-1 vom 2024-07-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018967.html","summary":"SUSE Security Update SUSE-SU-2024:2480-1 vom 2024-07-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018970.html","summary":"SUSE Security Update SUSE-SU-2024:2488-1 vom 2024-07-15","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6898-1","summary":"Ubuntu Security Notice USN-6898-1 vom 2024-07-15","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2024:4211","summary":"Rocky Linux Security Advisory RLSA-2024:4211 vom 2024-07-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018971.html","summary":"SUSE Security Update SUSE-SU-2024:2487-1 vom 2024-07-15","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2024:4352","summary":"Rocky Linux Security Advisory RLSA-2024:4352 vom 2024-07-15","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6895-2","summary":"Ubuntu Security Notice USN-6895-2 vom 2024-07-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018985.html","summary":"SUSE Security Update SUSE-SU-2024:2530-1 vom 2024-07-16","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6896-2","summary":"Ubuntu Security Notice USN-6896-2 vom 2024-07-16","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6896-3","summary":"Ubuntu Security Notice USN-6896-3 vom 2024-07-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6898-2","summary":"Ubuntu Security Notice USN-6898-2 vom 2024-07-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6900-1","summary":"Ubuntu Security Notice USN-6900-1 vom 2024-07-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018999.html","summary":"SUSE Security Update SUSE-SU-2024:2558-1 vom 2024-07-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018998.html","summary":"SUSE Security Update SUSE-SU-2024:2559-1 vom 2024-07-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/019000.html","summary":"SUSE Security Update SUSE-SU-2024:2549-1 vom 2024-07-18","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4631","summary":"Red Hat Security Advisory RHSA-2024:4631 vom 2024-07-18","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6896-4","summary":"Ubuntu Security Notice USN-6896-4 vom 2024-07-19","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6895-3","summary":"Ubuntu Security Notice USN-6895-3 vom 2024-07-19","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6898-3","summary":"Ubuntu Security Notice USN-6898-3 vom 2024-07-19","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6898-4","summary":"Ubuntu Security Notice USN-6898-4 vom 2024-07-23","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6896-5","summary":"Ubuntu Security Notice USN-6896-5 vom 2024-07-23","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6919-1","summary":"Ubuntu Security Notice USN-6919-1 vom 2024-07-26","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6917-1","summary":"Ubuntu Security Notice USN-6917-1 vom 2024-07-26","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6927-1","summary":"Ubuntu Security Notice USN-6927-1 vom 2024-07-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019089.html","summary":"SUSE Security Update SUSE-SU-2024:2723-1 vom 2024-08-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019088.html","summary":"SUSE Security Update SUSE-SU-2024:2723-1 vom 2024-08-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019090.html","summary":"SUSE Security Update SUSE-SU-2024:2722-1 vom 2024-08-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019087.html","summary":"SUSE Security Update SUSE-SU-2024:2723-1 vom 2024-08-02","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6895-4","summary":"Ubuntu Security Notice USN-6895-4 vom 2024-08-05","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019105.html","summary":"SUSE Security Update SUSE-SU-2024:2725-1 vom 2024-08-05","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019104.html","summary":"SUSE Security Update SUSE-SU-2024:2726-1 vom 2024-08-05","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019092.html","summary":"SUSE Security Update SUSE-SU-2024:2740-1 vom 2024-08-05","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019097.html","summary":"SUSE Security Update SUSE-SU-2024:2755-1 vom 2024-08-05","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019098.html","summary":"SUSE Security Update SUSE-SU-2024:2751-1 vom 2024-08-05","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019109.html","summary":"SUSE Security Update SUSE-SU-2024:2758-1 vom 2024-08-06","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019108.html","summary":"SUSE Security Update SUSE-SU-2024:2759-1 vom 2024-08-06","category":"external"},{"url":"https://www.dell.com/support/kbdoc/de-de/000227573/dsa-2024-348-security-update-for-dell-avamar-dell-networker-virtual-edition-nve-and-dell-powerprotect-dp-series-appliance-dell-integrated-data-protection-appliance-idpa-security-update-for-multiple-vulnerabilities","summary":"Dell Security Advisory DSA-2024-348 vom 2024-08-06","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019116.html","summary":"SUSE Security Update SUSE-SU-2024:2792-1 vom 2024-08-06","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5065","summary":"Red Hat Security Advisory RHSA-2024:5065 vom 2024-08-07","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019112.html","summary":"SUSE Security Update SUSE-SU-2024:2773-1 vom 2024-08-06","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html","summary":"SUSE Security Update SUSE-SU-2024:2802-1 vom 2024-08-07","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019144.html","summary":"SUSE Security Update SUSE-SU-2024:2850-1 vom 2024-08-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019146.html","summary":"SUSE Security Update SUSE-SU-2024:2841-1 vom 2024-08-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019147.html","summary":"SUSE Security Update SUSE-SU-2024:2840-1 vom 2024-08-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019142.html","summary":"SUSE Security Update SUSE-SU-2024:2852-1 vom 2024-08-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019155.html","summary":"SUSE Security Update SUSE-SU-2024:2821-1 vom 2024-08-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019152.html","summary":"SUSE Security Update SUSE-SU-2024:2824-1 vom 2024-08-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019143.html","summary":"SUSE Security Update SUSE-SU-2024:2851-1 vom 2024-08-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019145.html","summary":"SUSE Security Update SUSE-SU-2024:2843-1 vom 2024-08-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019154.html","summary":"SUSE Security Update SUSE-SU-2024:2822-1 vom 2024-08-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019151.html","summary":"SUSE Security Update SUSE-SU-2024:2825-1 vom 2024-08-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html","summary":"SUSE Security Update SUSE-SU-2024:2892-1 vom 2024-08-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html","summary":"SUSE Security Update SUSE-SU-2024:2896-1 vom 2024-08-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5363","summary":"Red Hat Security Advisory RHSA-2024:5363 vom 2024-08-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019194.html","summary":"SUSE Security Update SUSE-SU-2024:2901-1 vom 2024-08-14","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-5363.html","summary":"Oracle Linux Security Advisory ELSA-2024-5363 vom 2024-08-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019212.html","summary":"SUSE Security Update SUSE-SU-2024:2940-1 vom 2024-08-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/MFQEXBT2XPZQJMUF7MN6ZVO5FXVY4NKK/","summary":"SUSE Security Update SUSE-SU-2024:1663-1 vom 2024-08-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html","summary":"SUSE Security Update SUSE-SU-2024:2203-1 vom 2024-08-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html","summary":"SUSE Security Update SUSE-SU-2024:2973-1 vom 2024-08-20","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6974-1","summary":"Ubuntu Security Notice USN-6974-1 vom 2024-08-22","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6973-1","summary":"Ubuntu Security Notice USN-6973-1 vom 2024-08-22","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2024-082.html","summary":"Amazon Linux Security Advisory ALASKERNEL-5.4-2024-082 vom 2024-08-21","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6974-2","summary":"Ubuntu Security Notice USN-6974-2 vom 2024-08-23","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6973-2","summary":"Ubuntu Security Notice USN-6973-2 vom 2024-08-23","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6973-3","summary":"Ubuntu Security Notice USN-6973-3 vom 2024-08-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019309.html","summary":"SUSE Security Update SUSE-SU-2024:3015-1 vom 2024-08-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019326.html","summary":"SUSE Security Update SUSE-SU-2024:3037-1 vom 2024-08-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019324.html","summary":"SUSE Security Update SUSE-SU-2024:3039-1 vom 2024-08-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019322.html","summary":"SUSE Security Update SUSE-SU-2024:3043-1 vom 2024-08-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019320.html","summary":"SUSE Security Update SUSE-SU-2024:3048-1 vom 2024-08-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019315.html","summary":"SUSE Security Update SUSE-SU-2024:3034-1 vom 2024-08-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019321.html","summary":"SUSE Security Update SUSE-SU-2024:3044-1 vom 2024-08-27","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6973-4","summary":"Ubuntu Security Notice USN-6973-4 vom 2024-09-02","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7167662","summary":"IBM Security Bulletin 7167662 vom 2024-09-05","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7006-1","summary":"Ubuntu Security Notice USN-7006-1 vom 2024-09-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019459.html","summary":"SUSE Security Update SUSE-SU-2024:3320-1 vom 2024-09-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019461.html","summary":"SUSE Security Update SUSE-SU-2024:3318-1 vom 2024-09-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019477.html","summary":"SUSE Security Update SUSE-SU-2024:3348-1 vom 2024-09-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019476.html","summary":"SUSE Security Update SUSE-SU-2024:3349-1 vom 2024-09-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019478.html","summary":"SUSE Security Update SUSE-SU-2024:3347-1 vom 2024-09-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019469.html","summary":"SUSE Security Update SUSE-SU-2024:3334-1 vom 2024-09-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019468.html","summary":"SUSE Security Update SUSE-SU-2024:3336-1 vom 2024-09-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html","summary":"SUSE Security Update SUSE-SU-2024:3379-1 vom 2024-09-23","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html","summary":"SUSE Security Update SUSE-SU-2024:3368-1 vom 2024-09-23","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019486.html","summary":"SUSE Security Update SUSE-SU-2024:3375-1 vom 2024-09-23","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019491.html","summary":"SUSE Security Update SUSE-SU-2024:3363-1 vom 2024-09-23","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html","summary":"SUSE Security Update SUSE-SU-2024:3399-1 vom 2024-09-23","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7169778","summary":"IBM Security Bulletin 7169778 vom 2024-09-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:6993","summary":"Red Hat Security Advisory RHSA-2024:6993 vom 2024-09-24","category":"external"},{"url":"https://www.dell.com/support/kbdoc/de-de/000234730/dsa-2024-422-security-update-for-dell-networker-vproxy-multiple-component-vulnerabilities","summary":"Dell Security Advisory DSA-2024-422 vom 2024-10-10","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/XCWDJ4VQNWRMZU52FZIMVKO3ZX7QR3L7/","summary":"SUSE Security Update SUSE-SU-2024:3625-1 vom 2024-10-15","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/TF6OKVTF5VSUGWWYIUXLV2YZK7NYELIN/","summary":"SUSE Security Update SUSE-SU-2024:3623-1 vom 2024-10-15","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/IMA2L435Y3DOAG6IL6IEIK2SUGPOUZXD/","summary":"SUSE Security Update SUSE-SU-2024:3632-1 vom 2024-10-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html","summary":"SUSE Security Update SUSE-SU-2024:3642-1 vom 2024-10-15","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VBN5S6CN75ZWGV3ZNRLZRMQ5DF3HMBZE/","summary":"SUSE Security Update SUSE-SU-2024:3631-1 vom 2024-10-15","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:8161","summary":"Red Hat Security Advisory RHSA-2024:8161 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QREDIZHMC5MCDU7XHJHAPFFVPPIKTHWD/","summary":"SUSE Security Update SUSE-SU-2024:3639-1 vom 2024-10-15","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/SVZDNTNDPAUIILRXFRA47BDSDZ3IUQTH/","summary":"SUSE Security Update SUSE-SU-2024:3701-1 vom 2024-10-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-October/019619.html","summary":"SUSE Security Update SUSE-SU-2024:3649-1 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VLAP2QXVEHLNNWBLHF53IAVX5KBCFJGW/","summary":"SUSE Security Update SUSE-SU-2024:3651-1 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/A6BRGXRVSUAODD2ZZSX5GJCV46W4N5YB/","summary":"SUSE Security Update SUSE-SU-2024:3697-1 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/Y2P3R5HQ4Z7AYZLBXUGXBJMITFENT5NV/","summary":"SUSE Security Update SUSE-SU-2024:3694-1 vom 2024-10-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-October/019624.html","summary":"SUSE Security Update SUSE-SU-2024:3663-1 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/G3EDKBVPHAPKDJ45CNEJLJ4KGJAHJ4R7/","summary":"SUSE Security Update SUSE-SU-2024:3700-1 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/XAOP5G7ENALTQ2BLIJROCRJ3STRXQOFY/","summary":"SUSE Security Update SUSE-SU-2024:3652-1 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YYPGEHXE3QJ5NBRD57VSRTM36AC5DISM/","summary":"SUSE Security Update SUSE-SU-2024:3696-1 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/MOG44NUGCSJS6Q3AKMCV3X4IK2DN6CLL/","summary":"SUSE Security Update SUSE-SU-2024:3695-1 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/RDWWWR2VCADWSQCCZNNFB4VWOMZDOC63/","summary":"SUSE Security Update SUSE-SU-2024:3679-1 vom 2024-10-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html","summary":"SUSE Security Update SUSE-SU-2024:3662-1 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/S7NJHO236TM7NPYYRIFT2WLSXRC4WECV/","summary":"SUSE Security Update SUSE-SU-2024:3685-1 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/CLMHYECK5YKZDDXZ7XKEL3G5JXCF5QRM/","summary":"SUSE Security Update SUSE-SU-2024:3710-1 vom 2024-10-17","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:8614","summary":"Red Hat Security Advisory RHSA-2024:8614 vom 2024-10-30","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:8617","summary":"Red Hat Security Advisory RHSA-2024:8617 vom 2024-10-30","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:8613","summary":"Red Hat Security Advisory RHSA-2024:8613 vom 2024-10-30","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/JIUM76237NQIAK3CP7ENKHD5EOEBDHZH/","summary":"SUSE Security Update SUSE-SU-2024:3815-1 vom 2024-10-30","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QK6PZZGVJB6TX4W6LKJNJW74SGTITNGD/","summary":"SUSE Security Update SUSE-SU-2024:3831-1 vom 2024-10-30","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VHXZ2BQRCVWQY2AVSULS6AN56SITZ273/","summary":"SUSE Security Update SUSE-SU-2024:3837-1 vom 2024-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html","summary":"SUSE Security Update SUSE-SU-2024:3796-1 vom 2024-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html","summary":"SUSE Security Update SUSE-SU-2024:3820-1 vom 2024-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html","summary":"SUSE Security Update SUSE-SU-2024:3798-1 vom 2024-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html","summary":"SUSE Security Update SUSE-SU-2024:3803-1 vom 2024-10-30","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/5FIXDPPFE66BKRWS3X45YHODJJ57FQRT/","summary":"SUSE Security Update SUSE-SU-2024:3830-1 vom 2024-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html","summary":"SUSE Security Update SUSE-SU-2024:3793-1 vom 2024-10-30","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/RMOWLUMWUZKBWNWZRVPCJY43YUOMCMJ7/","summary":"SUSE Security Update SUSE-SU-2024:3829-1 vom 2024-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-October/019729.html","summary":"SUSE Security Update SUSE-SU-2024:3821-1 vom 2024-10-30","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/I22FOLEFZIBTJBTIPHH5GXPKMIXVDSDI/","summary":"SUSE Security Update SUSE-SU-2024:3806-1 vom 2024-10-30","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QW54KPSGGX7Q3N4CIMSAGZRZY4WGZV2D/","summary":"SUSE Security Update SUSE-SU-2024:3814-1 vom 2024-10-30","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VVJDY73ZQLYG6XTLPXQKV6DOXIBCWQNH/","summary":"SUSE Security Update SUSE-SU-2024:3842-1 vom 2024-10-31","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/DM3QIZHKHG7AW6EAKKMMWCCUOYK4JU3R/","summary":"SUSE Security Update SUSE-SU-2024:3857-1 vom 2024-10-31","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html","summary":"SUSE Security Update SUSE-SU-2024:3849-1 vom 2024-10-31","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/HVT4PHTMBZOBVPW2CI26GVIVJNWCBTVN/","summary":"SUSE Security Update SUSE-SU-2024:3855-1 vom 2024-10-31","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/CJCHUFTBOJTQRE24NTRP6WMCK5BGPZ3N/","summary":"SUSE Security Update SUSE-SU-2024:3852-1 vom 2024-10-31","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/7YDAYBSAUUUZVVIKYWRRX5O6ZCOQ2K46/","summary":"SUSE Security Update SUSE-SU-2024:3851-1 vom 2024-10-31","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-8617.html","summary":"Oracle Linux Security Advisory ELSA-2024-8617 vom 2024-10-31","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/6DKQ4KINQ5TXHK6JA63O3YINMJXE2QVJ/","summary":"SUSE Security Update SUSE-SU-2024:3854-1 vom 2024-10-31","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/UFUASUPHAEZFWXKIMGZLIZD4LHGMJ5YW/","summary":"SUSE Security Update SUSE-SU-2024:3860-1 vom 2024-10-31","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7174634","summary":"IBM Security Bulletin","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2024:8617","summary":"Rocky Linux Security Advisory RLSA-2024:8617 vom 2024-11-08","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:9315","summary":"Red Hat Security Advisory RHSA-2024:9315 vom 2024-11-12","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7176961","summary":"IBM Security Bulletin 7176961 vom 2024-11-22","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html","summary":"SUSE Security Update SUSE-SU-2024:4125-1 vom 2024-12-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html","summary":"SUSE Security Update SUSE-SU-2024:4122-1 vom 2024-12-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html","summary":"SUSE Security Update SUSE-SU-2024:4123-1 vom 2024-12-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html","summary":"SUSE Security Update SUSE-SU-2024:4124-1 vom 2024-12-02","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/3ACAYSLQECATBMYSIXEOONW3SJQYVWGD/","summary":"SUSE Security Update SUSE-SU-2024:4180-1 vom 2024-12-05","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/KHOJJYPB3I2C5FKMLHD5WFCQI342KAXA/","summary":"SUSE Security Update SUSE-SU-2024:4207-1 vom 2024-12-05","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/KZC5ZXKVE5JSNEKEAICAO52WN7SOJCTX/","summary":"SUSE Security Update SUSE-SU-2024:4216-1 vom 2024-12-05","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/4UVNDL3CU4NHVPE7QELR2N5HRCDSMYEV/","summary":"SUSE Security Update SUSE-SU-2024:4218-1 vom 2024-12-06","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/P4UZ4KLYIQHACIYR7LE2ANITUCPLWFYS/","summary":"SUSE Security Update SUSE-SU-2024:4214-1 vom 2024-12-05","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html","summary":"SUSE Security Update SUSE-SU-2024:4250-1 vom 2024-12-06","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/B6RMLGICBLD3BNXSBS7J23W3GCEJMFJA/","summary":"SUSE Security Update SUSE-SU-2024:4234-1 vom 2024-12-06","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html","summary":"SUSE Security Update SUSE-SU-2024:4242-1 vom 2024-12-06","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html","summary":"SUSE Security Update SUSE-SU-2024:4226-1 vom 2024-12-06","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html","summary":"SUSE Security Update SUSE-SU-2024:4249-1 vom 2024-12-06","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/34BVCDIDBQSXQ6Y3TVDGD4FSZ7N3D3LI/","summary":"SUSE Security Update SUSE-SU-2024:4256-1 vom 2024-12-06","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/ODASOBSBN3UUGHNO44MK2K4MC35CPLXJ/","summary":"SUSE Security Update SUSE-SU-2024:4236-1 vom 2024-12-06","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LIMMCWFWYJUMJTABZZ7ZEYXOOVE5BZY7/","summary":"SUSE Security Update SUSE-SU-2024:4235-1 vom 2024-12-06","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/GDL3TRRFKGYVQIW7MMTUJS76GCW7B3JZ/","summary":"SUSE Security Update SUSE-SU-2024:4243-1 vom 2024-12-06","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html","summary":"SUSE Security Update SUSE-SU-2024:4263-1 vom 2024-12-09","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/SZPUHL7SUZ57L3OJFO25IHYVDJ76ONGC/","summary":"SUSE Security Update SUSE-SU-2024:4264-1 vom 2024-12-09","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RRJRAM3LFR4MNOHCFB2XIOS6OJUDNUPE/","summary":"SUSE Security Update SUSE-SU-2024:4266-1 vom 2024-12-09","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:10941","summary":"Red Hat Security Advisory RHSA-2024:10941 vom 2024-12-11","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7179045","summary":"IBM Security Bulletin 7179045 vom 2024-12-16","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7179-1","summary":"Ubuntu Security Notice USN-7179-1 vom 2024-12-20","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7179-2","summary":"Ubuntu Security Notice USN-7179-2 vom 2025-01-06","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7186-1","summary":"Ubuntu Security Notice USN-7186-1 vom 2025-01-06","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:0063","summary":"Red Hat Security Advisory RHSA-2025:0063 vom 2025-01-08","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7179-3","summary":"Ubuntu Security Notice USN-7179-3 vom 2025-01-07","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:0064","summary":"Red Hat Security Advisory RHSA-2025:0064 vom 2025-01-08","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7194-1","summary":"Ubuntu Security Notice USN-7194-1 vom 2025-01-09","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7186-2","summary":"Ubuntu Security Notice USN-7186-2 vom 2025-01-09","category":"external"},{"url":"https://oss.oracle.com/pipermail/el-errata/2025-January/017000.html","summary":"Oracle Linux Security Advisory ELSA-2024-9315 vom 2025-01-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html","summary":"SUSE Security Update SUSE-SU-2025:0091-1 vom 2025-01-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html","summary":"SUSE Security Update SUSE-SU-2025:0103-1 vom 2025-01-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html","summary":"SUSE Security Update SUSE-SU-2025:0101-1 vom 2025-01-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html","summary":"SUSE Security Update SUSE-SU-2025:0106-1 vom 2025-01-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html","summary":"SUSE Security Update SUSE-SU-2025:0109-1 vom 2025-01-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html","summary":"SUSE Security Update SUSE-SU-2025:0107-1 vom 2025-01-14","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YC7MKFCHLBJHUQM2SLPOGVG4DUWP2J4E/","summary":"SUSE Security Update SUSE-SU-2025:0114-1 vom 2025-01-15","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VK2D63Q2FKHJWXOLVAS7HPIWURVL3MQQ/","summary":"SUSE Security Update SUSE-SU-2025:0115-1 vom 2025-01-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html","summary":"SUSE Security Update SUSE-SU-2025:0124-1 vom 2025-01-15","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/C6ANXHEO54VUUFEWI6QYB2M3L2SS7OOW/","summary":"SUSE Security Update SUSE-SU-2025:0146-1 vom 2025-01-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YHBMZ4MND2ONRG4N26VJNJGAZBXMYEDV/","summary":"SUSE Security Update SUSE-SU-2025:0137-1 vom 2025-01-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/USHZQFRYGMLVCVQRQLPH4FARDBDAEC6G/","summary":"SUSE Security Update SUSE-SU-2025:0150-1 vom 2025-01-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html","summary":"SUSE Security Update SUSE-SU-2025:0158-1 vom 2025-01-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html","summary":"SUSE Security Update SUSE-SU-2025:0164-1 vom 2025-01-17","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YNU4IXTEAXCI7QNPC2AVXZICYTGC4XXI/","summary":"SUSE Security Update SUSE-SU-2025:0238-1 vom 2025-01-27","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YCBYAV5OJRXD362FDCZUSIHNHOURONCF/","summary":"SUSE Security Update SUSE-SU-2025:0240-1 vom 2025-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html","summary":"SUSE Security Update SUSE-SU-2025:0261-1 vom 2025-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html","summary":"SUSE Security Update SUSE-SU-2025:0253-1 vom 2025-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html","summary":"SUSE Security Update SUSE-SU-2025:0248-1 vom 2025-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html","summary":"SUSE Security Update SUSE-SU-2025:0244-1 vom 2025-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html","summary":"SUSE Security Update SUSE-SU-2025:0251-1 vom 2025-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html","summary":"SUSE Security Update SUSE-SU-2025:0264-1 vom 2025-01-27","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7179-4","summary":"Ubuntu Security Notice USN-7179-4 vom 2025-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020213.html","summary":"SUSE Security Update SUSE-SU-2025:0254-1 vom 2025-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html","summary":"SUSE Security Update SUSE-SU-2025:0266-1 vom 2025-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html","summary":"SUSE Security Update SUSE-SU-2025:0252-1 vom 2025-01-27","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7181933","summary":"IBM Security Bulletin 7181933 vom 2025-01-29","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7233232","summary":"IBM Security Bulletin 7233232 vom 2025-05-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html","summary":"SUSE Security Update SUSE-SU-2025:20028-1 vom 2025-06-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021403.html","summary":"SUSE Security Update SUSE-SU-2025:20008-1 vom 2025-06-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-July/021770.html","summary":"SUSE Security Update SUSE-SU-2025:02254-1 vom 2025-07-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-July/021766.html","summary":"SUSE Security Update SUSE-SU-2025:02249-1 vom 2025-07-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-July/021804.html","summary":"SUSE Security Update SUSE-SU-2025:02307-1 vom 2025-07-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-July/021829.html","summary":"SUSE Security Update SUSE-SU-2025:02334-1 vom 2025-07-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-July/021828.html","summary":"SUSE Security Update SUSE-SU-2025:02335-1 vom 2025-07-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-July/021830.html","summary":"SUSE Security Update SUSE-SU-2025:02333-1 vom 2025-07-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-July/021919.html","summary":"SUSE Security Update SUSE-SU-2025:20475-1 vom 2025-07-21","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-July/021917.html","summary":"SUSE Security Update SUSE-SU-2025:20483-1 vom 2025-07-21","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-July/021967.html","summary":"SUSE Security Update SUSE-SU-2025:20493-1 vom 2025-07-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-July/021965.html","summary":"SUSE Security Update SUSE-SU-2025:20498-1 vom 2025-07-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-July/021981.html","summary":"SUSE Security Update SUSE-SU-2025:02538-1 vom 2025-07-28","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-August/022237.html","summary":"SUSE Security Update SUSE-SU-2025:02923-1 vom 2025-08-20","category":"external"},{"url":"https://www.dell.com/support/kbdoc/000385435","summary":"Dell Security Advisory DSA-2025-404 vom 2025-10-31","category":"external"},{"url":"https://www.dell.com/support/kbdoc/000385230","summary":"Dell Security Advisory DSA-2025-390 vom 2025-11-05","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024176.html","summary":"SUSE Security Update SUSE-SU-2026:20319-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024166.html","summary":"SUSE Security Update SUSE-SU-2026:20329-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024186.html","summary":"SUSE Security Update SUSE-SU-2026:20305-1 vom 2026-02-13","category":"external"},{"url":"https://lists.debian.org/debian-security-announce/2026/msg00071.html","summary":"Debian Security Advisory DSA-6163 vom 2026-03-13","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2026/03/msg00003.html","summary":"Debian Security Advisory DLA-4499 vom 2026-03-13","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-6037.html","summary":"Oracle Linux Security Advisory ELSA-2026-6037 vom 2026-04-01","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://lore.kernel.org/linux-cve-announce/2024041701-CVE-2023-52643-8834@gregkh/T/","published":"2024-04-16","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://lore.kernel.org/linux-cve-announce/2024041701-CVE-2023-52643-8834@gregkh/T/","added":"2026-03-31T00:00:00.000Z","public_url":"https://lore.kernel.org/linux-cve-announce/2024041701-CVE-2023-52643-8834@gregkh/T/","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-w-2024-0913 cve-2023-52642 linux kernel: mehrere schwachstellen ermöglichen denial of service bsi bsi","public_published":"2024-04-16","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31"},{"id":"BSI:WID-SEC-W-2024-1068","cve":"CVE-2024-2700","title":"Red Hat Enterprise Linux (Quarkus and Netty): Mehrere Schwachstellen","date":"2024-05-07","published":"2024-05-07","updated":"2026-03-31","source_published":"2024-05-07","source_updated":"2026-03-31","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://access.redhat.com/errata/RHSA-2024:2106","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1068.json","summary":"WID-SEC-W-2024-1068 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1068","summary":"WID-SEC-2024-1068 - Portal Version","category":"self"},{"url":"https://access.redhat.com/errata/RHSA-2024:2106","summary":"Red Hat Security Advisory vom 2024-05-07","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:2705","summary":"Red Hat Security Advisory RHSA-2024:2705 vom 2024-05-09","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:2833","summary":"Red Hat Security Advisory RHSA-2024:2833 vom 2024-05-14","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:2852","summary":"Red Hat Security Advisory RHSA-2024:2852 vom 2024-05-15","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:2834","summary":"Red Hat Security Advisory RHSA-2024:2834 vom 2024-05-16","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:3527","summary":"Red Hat Security Advisory RHSA-2024:3527 vom 2024-05-30","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:3550","summary":"Red Hat Security Advisory RHSA-2024:3550 vom 2024-06-03","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4028","summary":"Red Hat Security Advisory RHSA-2024:4028 vom 2024-06-20","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00015.html","summary":"Debian Security Advisory DLA-3834 vom 2024-06-21","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018880.html","summary":"SUSE Security Update SUSE-SU-2024:2313-1 vom 2024-07-08","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4460","summary":"Red Hat Security Advisory RHSA-2024:4460 vom 2024-07-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4873","summary":"Red Hat Security Advisory RHSA-2024:4873 vom 2024-07-26","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5143","summary":"Red Hat Security Advisory RHSA-2024:5143 vom 2024-08-09","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5144","summary":"Red Hat Security Advisory RHSA-2024:5144 vom 2024-08-09","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5145","summary":"Red Hat Security Advisory RHSA-2024:5145 vom 2024-08-09","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5147","summary":"Red Hat Security Advisory RHSA-2024:5147 vom 2024-08-09","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5481","summary":"Red Hat Security Advisory RHSA-2024:5481 vom 2024-08-16","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5479","summary":"Red Hat Security Advisory RHSA-2024:5479 vom 2024-08-16","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5482","summary":"Red Hat Security Advisory RHSA-2024:5482 vom 2024-08-16","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:6657","summary":"Red Hat Security Advisory RHSA-2024:6657 vom 2024-09-12","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/TNFN6MBU4SQLAGX7GNFLRGTPGY3IBHZG/","summary":"openSUSE Security Update OPENSUSE-SU-2024:14442-1 vom 2024-10-31","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:9571","summary":"Red Hat Security Advisory RHSA-2024:9571 vom 2024-11-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:11023","summary":"Red Hat Security Advisory RHSA-2024:11023 vom 2024-12-12","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7180361","summary":"IBM Security Bulletin 7180361 vom 2025-01-07","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7284-1","summary":"Ubuntu Security Notice USN-7284-1 vom 2025-02-24","category":"external"},{"url":"https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2025-113/index.html","summary":"Hitachi Vulnerability Information HITACHI-SEC-2025-113 vom 2025-05-15","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7248128","summary":"IBM Security Bulletin 7248128 vom 2025-10-16","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2026/03/msg00023.html","summary":"Debian Security Advisory DLA-4519 vom 2026-03-31","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://access.redhat.com/errata/RHSA-2024:2106","published":"2024-05-07","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://access.redhat.com/errata/RHSA-2024:2106","added":"2026-03-31T00:00:00.000Z","public_url":"https://access.redhat.com/errata/RHSA-2024:2106","public_source":"Red Hat","public_source_slug":"red-hat","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-w-2024-1068 cve-2024-2700 red hat enterprise linux (quarkus and netty): mehrere schwachstellen red hat bsi","public_published":"2024-05-07","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31"},{"id":"BSI:WID-SEC-W-2024-1188","cve":"CVE-2023-52657","title":"Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2024-05-20","published":"2024-05-20","updated":"2026-03-31","source_published":"2024-05-20","source_updated":"2026-03-31","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://lore.kernel.org/linux-cve-announce/2024051758-CVE-2023-52657-628c@gregkh/T/","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1188.json","summary":"WID-SEC-W-2024-1188 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1188","summary":"WID-SEC-2024-1188 - Portal Version","category":"self"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051758-CVE-2023-52657-628c@gregkh/T/","summary":"Linux CVE Announcement CVE-2023-52657 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051717-CVE-2023-52658-4c61@gregkh/T/","summary":"Linux CVE Announcement CVE-2023-52658 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051755-CVE-2023-52659-6f51@gregkh/T/","summary":"Linux CVE Announcement CVE-2023-52659 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051755-CVE-2023-52660-6eac@gregkh/T/","summary":"Linux CVE Announcement CVE-2023-52660 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051738-CVE-2023-52661-5539@gregkh/T/","summary":"Linux CVE Announcement CVE-2023-52661 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051740-CVE-2023-52662-1536@gregkh/T/","summary":"Linux CVE Announcement CVE-2023-52662 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051740-CVE-2023-52663-1045@gregkh/T/","summary":"Linux CVE Announcement CVE-2023-52663 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051756-CVE-2023-52664-dea1@gregkh/T/","summary":"Linux CVE Announcement CVE-2023-52664 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051725-CVE-2023-52665-1d6f@gregkh/T/","summary":"Linux CVE Announcement CVE-2023-52665 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051727-CVE-2023-52666-802b@gregkh/T/","summary":"Linux CVE Announcement CVE-2023-52666 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051728-CVE-2023-52667-649b@gregkh/T/","summary":"Linux CVE Announcement CVE-2023-52667 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051728-CVE-2023-52668-4da2@gregkh/T/","summary":"Linux CVE Announcement CVE-2023-52668 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051728-CVE-2023-52669-5a58@gregkh/T/","summary":"Linux CVE Announcement CVE-2023-52669 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051729-CVE-2023-52670-a191@gregkh/T/","summary":"Linux CVE Announcement CVE-2023-52670 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051729-CVE-2023-52671-a2df@gregkh/T/","summary":"Linux CVE Announcement CVE-2023-52671 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051729-CVE-2023-52672-f30c@gregkh/T/","summary":"Linux CVE Announcement CVE-2023-52672 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051729-CVE-2023-52673-57e2@gregkh/T/","summary":"Linux CVE Announcement CVE-2023-52673 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051747-CVE-2023-52674-2aec@gregkh/T/","summary":"Linux CVE Announcement CVE-2023-52674 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051749-CVE-2023-52675-4d66@gregkh/T/","summary":"Linux CVE Announcement CVE-2023-52675 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051749-CVE-2023-52676-e224@gregkh/T/","summary":"Linux CVE Announcement CVE-2023-52676 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051749-CVE-2023-52677-5d0c@gregkh/T/","summary":"Linux CVE Announcement CVE-2023-52677 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051750-CVE-2023-52678-32b5@gregkh/T/","summary":"Linux CVE Announcement CVE-2023-52678 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051750-CVE-2023-52679-948f@gregkh/T/","summary":"Linux CVE Announcement CVE-2023-52679 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051750-CVE-2023-52680-1f4a@gregkh/T/","summary":"Linux CVE Announcement CVE-2023-52680 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051751-CVE-2023-52681-9f54@gregkh/T/","summary":"Linux CVE Announcement CVE-2023-52681 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051751-CVE-2023-52682-fae2@gregkh/T/","summary":"Linux CVE Announcement CVE-2023-52682 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051751-CVE-2023-52683-f280@gregkh/T/","summary":"Linux CVE Announcement CVE-2023-52683 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051752-CVE-2023-52684-8d25@gregkh/T/","summary":"Linux CVE Announcement CVE-2023-52684 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051752-CVE-2023-52685-64c5@gregkh/T/","summary":"Linux CVE Announcement CVE-2023-52685 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051752-CVE-2023-52686-4a08@gregkh/T/","summary":"Linux CVE Announcement CVE-2023-52686 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051752-CVE-2023-52687-b540@gregkh/T/","summary":"Linux CVE Announcement CVE-2023-52687 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051753-CVE-2023-52688-4932@gregkh/T/","summary":"Linux CVE Announcement CVE-2023-52688 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051753-CVE-2023-52689-f657@gregkh/T/","summary":"Linux CVE Announcement CVE-2023-52689 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051753-CVE-2023-52690-f225@gregkh/T/","summary":"Linux CVE Announcement CVE-2023-52690 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051754-CVE-2023-52691-bad0@gregkh/T/","summary":"Linux CVE Announcement CVE-2023-52691 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051754-CVE-2023-52692-4d94@gregkh/T/","summary":"Linux CVE Announcement CVE-2023-52692 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051754-CVE-2023-52693-04db@gregkh/T/","summary":"Linux CVE Announcement CVE-2023-52693 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051755-CVE-2023-52694-dad8@gregkh/T/","summary":"Linux CVE Announcement CVE-2023-52694 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051755-CVE-2023-52695-3d29@gregkh/T/","summary":"Linux CVE Announcement CVE-2023-52695 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051755-CVE-2023-52696-d4ab@gregkh/T/","summary":"Linux CVE Announcement CVE-2023-52696 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051755-CVE-2023-52697-1b7f@gregkh/T/","summary":"Linux CVE Announcement CVE-2023-52697 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051756-CVE-2023-52698-bbc2@gregkh/T/","summary":"Linux CVE Announcement CVE-2023-52698 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051910-CVE-2023-52699-4099@gregkh/T/","summary":"Linux CVE Announcement CVE-2023-52699 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051736-CVE-2024-27402-90cf@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-27402 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051738-CVE-2024-27403-c4ba@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-27403 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051738-CVE-2024-27404-ab54@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-27404 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051739-CVE-2024-27405-6768@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-27405 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051739-CVE-2024-27406-cfc3@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-27406 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051739-CVE-2024-27407-976d@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-27407 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051700-CVE-2024-27408-6911@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-27408 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051701-CVE-2024-27409-f797@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-27409 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051701-CVE-2024-27410-874a@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-27410 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051701-CVE-2024-27411-1af2@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-27411 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051702-CVE-2024-27412-3c4b@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-27412 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051702-CVE-2024-27413-bccd@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-27413 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051702-CVE-2024-27414-5c5d@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-27414 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051702-CVE-2024-27415-dcae@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-27415 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051703-CVE-2024-27416-f368@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-27416 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051703-CVE-2024-27417-3841@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-27417 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051703-CVE-2024-27418-3cda@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-27418 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051719-CVE-2024-27419-726a@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-27419 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051720-CVE-2024-27420-f76f@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-27420 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051720-CVE-2024-27421-77a2@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-27421 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051720-CVE-2024-27422-2854@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-27422 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051720-CVE-2024-27423-3abe@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-27423 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051721-CVE-2024-27424-abaf@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-27424 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051721-CVE-2024-27425-a235@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-27425 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051721-CVE-2024-27426-341e@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-27426 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051722-CVE-2024-27427-14e0@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-27427 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051722-CVE-2024-27428-2df6@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-27428 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051722-CVE-2024-27429-878c@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-27429 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051723-CVE-2024-27430-f8b8@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-27430 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051723-CVE-2024-27431-30ae@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-27431 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051755-CVE-2024-27432-e3bd@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-27432 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051756-CVE-2024-27433-42fb@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-27433 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051756-CVE-2024-27434-ac61@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-27434 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051710-CVE-2024-27435-c465@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-27435 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051711-CVE-2024-27436-2227@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-27436 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051704-CVE-2024-35784-6dec@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35784 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051706-CVE-2024-35785-b813@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35785 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051707-CVE-2024-35786-0d93@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35786 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051707-CVE-2024-35787-dede@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35787 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051707-CVE-2024-35788-877d@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35788 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051707-CVE-2024-35789-52e5@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35789 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051708-CVE-2024-35790-6a80@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35790 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051708-CVE-2024-35791-65ad@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35791 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051708-CVE-2024-35792-d944@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35792 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051709-CVE-2024-35793-6171@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35793 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051709-CVE-2024-35794-f42d@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35794 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051734-CVE-2024-35795-ee3e@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35795 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051736-CVE-2024-35796-e66c@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35796 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051737-CVE-2024-35797-06f6@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35797 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051737-CVE-2024-35798-8d90@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35798 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051737-CVE-2024-35799-75e5@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35799 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051738-CVE-2024-35800-219a@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35800 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051738-CVE-2024-35801-8038@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35801 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051738-CVE-2024-35802-959d@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35802 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051739-CVE-2024-35803-c81f@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35803 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051739-CVE-2024-35804-bd95@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35804 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051739-CVE-2024-35805-179f@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35805 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051739-CVE-2024-35806-38c3@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35806 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051740-CVE-2024-35807-2a9e@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35807 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051740-CVE-2024-35808-2bf6@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35808 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051740-CVE-2024-35809-4a4e@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35809 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051741-CVE-2024-35810-1b33@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35810 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051741-CVE-2024-35811-9306@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35811 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051741-CVE-2024-35812-c804@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35812 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051742-CVE-2024-35813-bdc9@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35813 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051742-CVE-2024-35814-98c7@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35814 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051742-CVE-2024-35815-c819@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35815 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051742-CVE-2024-35816-183c@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35816 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051743-CVE-2024-35817-d29b@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35817 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051743-CVE-2024-35818-d446@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35818 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051743-CVE-2024-35819-d234@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35819 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051744-CVE-2024-35820-6aa4@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35820 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051744-CVE-2024-35821-6af5@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35821 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051744-CVE-2024-35822-410b@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35822 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051745-CVE-2024-35823-1e69@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35823 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051737-CVE-2024-35824-7302@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35824 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051737-CVE-2024-35825-9e41@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35825 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051737-CVE-2024-35826-c17f@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35826 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051741-CVE-2024-35827-822c@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35827 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051741-CVE-2024-35828-0024@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35828 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051741-CVE-2024-35829-2457@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35829 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051742-CVE-2024-35830-4ad0@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35830 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051742-CVE-2024-35831-abcc@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35831 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051730-CVE-2024-35832-b2f8@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35832 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051731-CVE-2024-35833-0b1b@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35833 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051730-CVE-2024-35834-2378@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35834 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051730-CVE-2024-35835-d75f@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35835 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051730-CVE-2024-35836-9638@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35836 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051731-CVE-2024-35837-3159@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35837 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051731-CVE-2024-35838-d072@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35838 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051756-CVE-2024-35839-4194@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35839 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051756-CVE-2024-35840-99fa@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35840 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051757-CVE-2024-35841-1f2e@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35841 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051757-CVE-2024-35842-2d97@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35842 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051717-CVE-2024-35843-516e@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35843 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051718-CVE-2024-35844-7ddb@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35844 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051718-CVE-2024-35845-65bd@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35845 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051738-CVE-2024-35846-d8bf@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35846 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051738-CVE-2024-35847-7e4b@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35847 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051738-CVE-2024-35848-fc2b@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35848 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051739-CVE-2024-35849-d74e@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35849 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051739-CVE-2024-35850-2b62@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35850 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051739-CVE-2024-35851-31be@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35851 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051740-CVE-2024-35852-9e9a@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35852 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051740-CVE-2024-35853-869a@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35853 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051740-CVE-2024-35854-d17b@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35854 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051741-CVE-2024-35855-c1fb@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35855 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051741-CVE-2024-35856-a7ed@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35856 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051741-CVE-2024-35857-837c@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35857 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051742-CVE-2024-35858-1470@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35858 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051742-CVE-2024-35859-23c9@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35859 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051935-CVE-2024-35860-04fd@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35860 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051937-CVE-2024-35861-dcfe@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35861 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051937-CVE-2024-35862-eda2@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35862 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051938-CVE-2024-35863-7c05@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35863 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051938-CVE-2024-35864-3536@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35864 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051939-CVE-2024-35865-c095@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35865 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051939-CVE-2024-35866-97e5@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35866 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051939-CVE-2024-35867-15e3@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35867 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051940-CVE-2024-35868-be7a@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35868 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051940-CVE-2024-35869-73f8@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35869 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051940-CVE-2024-35870-3c02@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35870 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051941-CVE-2024-35871-2db0@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35871 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051941-CVE-2024-35872-4632@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35872 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051942-CVE-2024-35873-40f1@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35873 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051942-CVE-2024-35874-c494@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35874 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051942-CVE-2024-35875-e23d@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35875 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051943-CVE-2024-35876-d9b5@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35876 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051943-CVE-2024-35877-39e6@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35877 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051943-CVE-2024-35878-5af8@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35878 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051944-CVE-2024-35879-963b@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35879 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051944-CVE-2024-35880-6ffb@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35880 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051945-CVE-2024-35881-08cd@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35881 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051945-CVE-2024-35882-f7cf@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35882 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051945-CVE-2024-35883-471d@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35883 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051946-CVE-2024-35884-d4a4@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35884 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051946-CVE-2024-35885-ce9c@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35885 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051946-CVE-2024-35886-19d4@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35886 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051947-CVE-2024-35887-9c08@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35887 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051947-CVE-2024-35888-1e04@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35888 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051948-CVE-2024-35889-023e@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35889 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051948-CVE-2024-35890-beaa@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35890 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051948-CVE-2024-35891-3a56@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35891 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051949-CVE-2024-35892-0f0c@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35892 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051949-CVE-2024-35893-5132@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35893 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051949-CVE-2024-35894-fd19@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35894 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051950-CVE-2024-35895-cb33@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35895 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051950-CVE-2024-35896-e6b5@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35896 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051951-CVE-2024-35897-1585@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35897 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051951-CVE-2024-35898-a10e@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35898 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051951-CVE-2024-35899-c56a@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35899 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051952-CVE-2024-35900-c2c9@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35900 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051952-CVE-2024-35901-6e99@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35901 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051952-CVE-2024-35902-a288@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35902 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051953-CVE-2024-35903-c5d9@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35903 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051953-CVE-2024-35904-7f85@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35904 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051954-CVE-2024-35905-d079@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35905 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051954-CVE-2024-35906-1c6f@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35906 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051954-CVE-2024-35907-32f9@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35907 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051955-CVE-2024-35908-e78a@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35908 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051955-CVE-2024-35909-a00f@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35909 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051955-CVE-2024-35910-5f95@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35910 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051956-CVE-2024-35911-f6f9@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35911 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051956-CVE-2024-35912-b093@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35912 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051956-CVE-2024-35913-72a4@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35913 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051957-CVE-2024-35914-3194@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35914 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051957-CVE-2024-35915-aead@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35915 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051958-CVE-2024-35916-67f1@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35916 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051958-CVE-2024-35917-df0b@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35917 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051912-CVE-2024-35918-3fed@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35918 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051913-CVE-2024-35919-b10c@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35919 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051913-CVE-2024-35920-ceed@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35920 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051913-CVE-2024-35921-ec49@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35921 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051913-CVE-2024-35922-650f@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35922 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051914-CVE-2024-35923-ddae@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35923 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051914-CVE-2024-35924-90f6@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35924 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051914-CVE-2024-35925-fa17@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35925 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051915-CVE-2024-35926-d677@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35926 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051915-CVE-2024-35927-2100@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35927 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051915-CVE-2024-35928-ead3@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35928 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051916-CVE-2024-35929-6f74@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35929 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051916-CVE-2024-35930-5571@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35930 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051916-CVE-2024-35931-430d@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35931 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051916-CVE-2024-35932-b008@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35932 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051917-CVE-2024-35933-cf34@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35933 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051917-CVE-2024-35934-c8af@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35934 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051917-CVE-2024-35935-cdbd@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35935 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051918-CVE-2024-35936-990c@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35936 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051918-CVE-2024-35937-0415@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35937 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051918-CVE-2024-35938-0100@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35938 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051919-CVE-2024-35939-f877@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35939 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051919-CVE-2024-35940-5c73@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35940 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051919-CVE-2024-35941-1a9e@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35941 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051919-CVE-2024-35942-af72@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35942 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051920-CVE-2024-35943-93a9@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35943 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051920-CVE-2024-35944-a860@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35944 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051920-CVE-2024-35945-c005@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35945 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051921-CVE-2024-35946-c2c2@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35946 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024051952-CVE-2024-35947-09bb@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35947 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052043-CVE-2024-35948-a92f@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35948 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052045-CVE-2024-35949-4a64@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35949 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052015-CVE-2024-35950-41bf@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35950 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052017-CVE-2024-35951-d66a@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35951 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052017-CVE-2024-35952-645b@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35952 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052018-CVE-2024-35953-a809@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35953 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052018-CVE-2024-35954-cdbf@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35954 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052018-CVE-2024-35955-2555@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35955 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052018-CVE-2024-35956-3c25@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35956 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052019-CVE-2024-35957-8c83@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35957 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052019-CVE-2024-35958-18a7@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35958 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052019-CVE-2024-35959-6e06@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35959 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052020-CVE-2024-35960-2eaa@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35960 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052020-CVE-2024-35961-dbbf@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35961 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052020-CVE-2024-35962-e5ce@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35962 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052021-CVE-2024-35963-7934@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35963 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052021-CVE-2024-35964-25e2@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35964 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052021-CVE-2024-35965-19f1@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35965 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052021-CVE-2024-35966-e107@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35966 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052022-CVE-2024-35967-d111@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35967 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052022-CVE-2024-35968-80ae@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35968 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052022-CVE-2024-35969-4a04@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35969 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052023-CVE-2024-35970-2b77@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35970 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052023-CVE-2024-35971-fb84@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35971 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052023-CVE-2024-35972-138d@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35972 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052024-CVE-2024-35973-1b5b@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35973 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052024-CVE-2024-35974-7008@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35974 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052024-CVE-2024-35975-1696@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35975 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052024-CVE-2024-35976-339b@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35976 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052025-CVE-2024-35977-5edd@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35977 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052025-CVE-2024-35978-adaa@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35978 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052025-CVE-2024-35979-2618@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35979 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052026-CVE-2024-35980-7f0c@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35980 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052026-CVE-2024-35981-2fb9@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35981 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052026-CVE-2024-35982-aeed@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35982 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052018-CVE-2024-35983-a607@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35983 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052018-CVE-2024-35984-d72b@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35984 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052018-CVE-2024-35985-8839@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35985 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052019-CVE-2024-35986-c76f@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35986 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052019-CVE-2024-35987-c5e7@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35987 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052019-CVE-2024-35988-22a1@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35988 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052020-CVE-2024-35989-c5da@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35989 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052020-CVE-2024-35990-9e74@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35990 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052020-CVE-2024-35991-5f06@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35991 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052020-CVE-2024-35992-2e88@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35992 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052021-CVE-2024-35993-0309@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35993 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052021-CVE-2024-35994-d606@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35994 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052021-CVE-2024-35995-abbc@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35995 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052022-CVE-2024-35996-3f86@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35996 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052022-CVE-2024-35997-1a3c@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35997 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052022-CVE-2024-35998-96a4@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35998 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052023-CVE-2024-35999-da29@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-35999 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052023-CVE-2024-36000-cfc4@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-36000 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052023-CVE-2024-36001-e6a9@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-36001 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052023-CVE-2024-36002-c5bc@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-36002 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052024-CVE-2024-36003-33b4@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-36003 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052024-CVE-2024-36004-fb45@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-36004 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052024-CVE-2024-36005-2336@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-36005 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052025-CVE-2024-36006-c032@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-36006 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052025-CVE-2024-36007-052e@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-36007 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052025-CVE-2024-36008-0637@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-36008 vom 2024-05-20","category":"external"},{"url":"https://lore.kernel.org/linux-cve-announce/2024052026-CVE-2024-36009-f213@gregkh/T/","summary":"Linux CVE Announcement CVE-2024-36009 vom 2024-05-20","category":"external"},{"url":"https://kernel.org/","summary":"Linux Kernel CVE Announcements vom 2024-05-20","category":"external"},{"url":"https://lists.debian.org/debian-security-announce/2024/msg00113.html","summary":"Debian Security Advisory DSA-5703 vom 2024-06-02","category":"external"},{"url":"https://oss.oracle.com/pipermail/el-errata/2024-June/015801.html","summary":"Oracle Linux Security Advisory ELSA-2024-12377 vom 2024-06-05","category":"external"},{"url":"https://oss.oracle.com/pipermail/el-errata/2024-June/015802.html","summary":"Oracle Linux Security Advisory ELSA-2024-12377 vom 2024-06-05","category":"external"},{"url":"https://oss.oracle.com/pipermail/el-errata/2024-June/015806.html","summary":"Oracle Linux Security Advisory ELSA-2024-12385 vom 2024-06-05","category":"external"},{"url":"https://oss.oracle.com/pipermail/el-errata/2024-June/015807.html","summary":"Oracle Linux Security Advisory ELSA-2024-12385 vom 2024-06-05","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6821-1","summary":"Ubuntu Security Notice USN-6821-1 vom 2024-06-08","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6817-1","summary":"Ubuntu Security Notice USN-6817-1 vom 2024-06-08","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6816-1","summary":"Ubuntu Security Notice USN-6816-1 vom 2024-06-08","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6820-1","summary":"Ubuntu Security Notice USN-6820-1 vom 2024-06-08","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6818-1","summary":"Ubuntu Security Notice USN-6818-1 vom 2024-06-08","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6819-1","summary":"Ubuntu Security Notice USN-6819-1 vom 2024-06-08","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6818-2","summary":"Ubuntu Security Notice USN-6818-2 vom 2024-06-10","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6821-2","summary":"Ubuntu Security Notice USN-6821-2 vom 2024-06-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018685.html","summary":"SUSE Security Update SUSE-SU-2024:1979-1 vom 2024-06-11","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:3854","summary":"Red Hat Security Advisory RHSA-2024:3854 vom 2024-06-12","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2024-044.html","summary":"Amazon Linux Security Advisory ALASKERNEL-5.15-2024-044 vom 2024-06-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018700.html","summary":"SUSE Security Update SUSE-SU-2024:1983-1 vom 2024-06-11","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6819-2","summary":"Ubuntu Security Notice USN-6819-2 vom 2024-06-12","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6828-1","summary":"Ubuntu Security Notice USN-6828-1 vom 2024-06-11","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6821-3","summary":"Ubuntu Security Notice USN-6821-3 vom 2024-06-11","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6817-2","summary":"Ubuntu Security Notice USN-6817-2 vom 2024-06-11","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6820-2","summary":"Ubuntu Security Notice USN-6820-2 vom 2024-06-11","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:3855","summary":"Red Hat Security Advisory RHSA-2024:3855 vom 2024-06-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018711.html","summary":"SUSE Security Update SUSE-SU-2024:2010-1 vom 2024-06-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018710.html","summary":"SUSE Security Update SUSE-SU-2024:2011-1 vom 2024-06-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018706.html","summary":"SUSE Security Update SUSE-SU-2024:2008-1 vom 2024-06-12","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6819-3","summary":"Ubuntu Security Notice USN-6819-3 vom 2024-06-12","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6831-1","summary":"Ubuntu Security Notice USN-6831-1 vom 2024-06-12","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6818-3","summary":"Ubuntu Security Notice USN-6818-3 vom 2024-06-14","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6817-3","summary":"Ubuntu Security Notice USN-6817-3 vom 2024-06-14","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6821-4","summary":"Ubuntu Security Notice USN-6821-4 vom 2024-06-14","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6818-4","summary":"Ubuntu Security Notice USN-6818-4 vom 2024-06-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018783.html","summary":"SUSE Security Update SUSE-SU-2024:2135-1 vom 2024-06-21","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018809.html","summary":"SUSE Security Update SUSE-SU-2024:2185-1 vom 2024-06-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018808.html","summary":"SUSE Security Update SUSE-SU-2024:2183-1 vom 2024-06-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018807.html","summary":"SUSE Security Update SUSE-SU-2024:2184-1 vom 2024-06-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018811.html","summary":"SUSE Security Update SUSE-SU-2024:2189-1 vom 2024-06-25","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html","summary":"Debian Security Advisory DLA-3842 vom 2024-06-25","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4106","summary":"Red Hat Security Advisory RHSA-2024:4106 vom 2024-06-26","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4108","summary":"Red Hat Security Advisory RHSA-2024:4108 vom 2024-06-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018819.html","summary":"SUSE Security Update SUSE-SU-2024:2190-1 vom 2024-06-25","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html","summary":"Debian Security Advisory DLA-3841 vom 2024-06-25","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6819-4","summary":"Ubuntu Security Notice USN-6819-4 vom 2024-06-26","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html","summary":"Debian Security Advisory DLA-3843 vom 2024-06-27","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html","summary":"Debian Security Advisory DLA-3840 vom 2024-06-27","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4211","summary":"Red Hat Security Advisory RHSA-2024:4211 vom 2024-07-02","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-4211.html","summary":"Oracle Linux Security Advisory ELSA-2024-4211 vom 2024-07-03","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6874-1","summary":"Ubuntu Security Notice USN-6874-1 vom 2024-07-04","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6871-1","summary":"Ubuntu Security Notice USN-6871-1 vom 2024-07-04","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6875-1","summary":"Ubuntu Security Notice USN-6875-1 vom 2024-07-04","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6867-1","summary":"Ubuntu Security Notice USN-6867-1 vom 2024-07-04","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6878-1","summary":"Ubuntu Security Notice USN-6878-1 vom 2024-07-04","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4352","summary":"Red Hat Security Advisory RHSA-2024:4352 vom 2024-07-08","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4349","summary":"Red Hat Security Advisory RHSA-2024:4349 vom 2024-07-08","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-4349.html","summary":"Oracle Linux Security Advisory ELSA-2024-4349 vom 2024-07-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018901.html","summary":"SUSE Security Update SUSE-SU-2024:2372-1 vom 2024-07-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018897.html","summary":"SUSE Security Update SUSE-SU-2024:2365-1 vom 2024-07-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018905.html","summary":"SUSE Security Update SUSE-SU-2024:2362-1 vom 2024-07-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018907.html","summary":"SUSE Security Update SUSE-SU-2024:2360-1 vom 2024-07-09","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4447","summary":"Red Hat Security Advisory RHSA-2024:4447 vom 2024-07-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018916.html","summary":"SUSE Security Update SUSE-SU-2024:2381-1 vom 2024-07-10","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6892-1","summary":"Ubuntu Security Notice USN-6892-1 vom 2024-07-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4321","summary":"Red Hat Security Advisory RHSA-2024:4321 vom 2024-07-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018920.html","summary":"SUSE Security Update SUSE-SU-2024:2385-1 vom 2024-07-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018921.html","summary":"SUSE Security Update SUSE-SU-2024:2384-1 vom 2024-07-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018922.html","summary":"SUSE Security Update SUSE-SU-2024:2394-1 vom 2024-07-10","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6893-1","summary":"Ubuntu Security Notice USN-6893-1 vom 2024-07-11","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS-2024-2584.html","summary":"Amazon Linux Security Advisory ALAS-2024-2584 vom 2024-07-11","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6895-1","summary":"Ubuntu Security Notice USN-6895-1 vom 2024-07-12","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4533","summary":"Red Hat Security Advisory RHSA-2024:4533 vom 2024-07-15","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6896-1","summary":"Ubuntu Security Notice USN-6896-1 vom 2024-07-12","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2024:4349","summary":"Rocky Linux Security Advisory RLSA-2024:4349 vom 2024-07-15","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2024:4352","summary":"Rocky Linux Security Advisory RLSA-2024:4352 vom 2024-07-15","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4554","summary":"Red Hat Security Advisory RHSA-2024:4554 vom 2024-07-16","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2024:4211","summary":"Rocky Linux Security Advisory RLSA-2024:4211 vom 2024-07-15","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6898-1","summary":"Ubuntu Security Notice USN-6898-1 vom 2024-07-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html","summary":"SUSE Security Update SUSE-SU-2024:2495-1 vom 2024-07-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018984.html","summary":"SUSE Security Update SUSE-SU-2024:2493-1 vom 2024-07-16","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6895-2","summary":"Ubuntu Security Notice USN-6895-2 vom 2024-07-16","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6893-2","summary":"Ubuntu Security Notice USN-6893-2 vom 2024-07-16","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4583","summary":"Red Hat Security Advisory RHSA-2024:4583 vom 2024-07-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6896-2","summary":"Ubuntu Security Notice USN-6896-2 vom 2024-07-16","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6896-3","summary":"Ubuntu Security Notice USN-6896-3 vom 2024-07-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6900-1","summary":"Ubuntu Security Notice USN-6900-1 vom 2024-07-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6898-2","summary":"Ubuntu Security Notice USN-6898-2 vom 2024-07-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html","summary":"SUSE Security Update SUSE-SU-2024:2561-1 vom 2024-07-18","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4631","summary":"Red Hat Security Advisory RHSA-2024:4631 vom 2024-07-18","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-4583.html","summary":"Oracle Linux Security Advisory ELSA-2024-4583 vom 2024-07-19","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6896-4","summary":"Ubuntu Security Notice USN-6896-4 vom 2024-07-19","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6895-3","summary":"Ubuntu Security Notice USN-6895-3 vom 2024-07-19","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6898-3","summary":"Ubuntu Security Notice USN-6898-3 vom 2024-07-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/019019.html","summary":"SUSE Security Update SUSE-SU-2024:2571-1 vom 2024-07-22","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6898-4","summary":"Ubuntu Security Notice USN-6898-4 vom 2024-07-23","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6893-3","summary":"Ubuntu Security Notice USN-6893-3 vom 2024-07-23","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6896-5","summary":"Ubuntu Security Notice USN-6896-5 vom 2024-07-23","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4740","summary":"Red Hat Security Advisory RHSA-2024:4740 vom 2024-07-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4823","summary":"Red Hat Security Advisory RHSA-2024:4823 vom 2024-07-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4831","summary":"Red Hat Security Advisory RHSA-2024:4831 vom 2024-07-24","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6917-1","summary":"Ubuntu Security Notice USN-6917-1 vom 2024-07-26","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6918-1","summary":"Ubuntu Security Notice USN-6918-1 vom 2024-07-26","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6919-1","summary":"Ubuntu Security Notice USN-6919-1 vom 2024-07-26","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2024:4583","summary":"Rocky Linux Security Advisory RLSA-2024:4583 vom 2024-07-26","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4902","summary":"Red Hat Security Advisory RHSA-2024:4902 vom 2024-07-29","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6921-1","summary":"Ubuntu Security Notice USN-6921-1 vom 2024-07-29","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6926-1","summary":"Ubuntu Security Notice USN-6926-1 vom 2024-07-29","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6921-2","summary":"Ubuntu Security Notice USN-6921-2 vom 2024-07-30","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4928","summary":"Red Hat Security Advisory RHSA-2024:4928 vom 2024-07-31","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6927-1","summary":"Ubuntu Security Notice USN-6927-1 vom 2024-07-30","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-4928.html","summary":"Oracle Linux Security Advisory ELSA-2024-4928 vom 2024-08-01","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6938-1","summary":"Ubuntu Security Notice USN-6938-1 vom 2024-07-31","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2024:4928","summary":"Rocky Linux Security Advisory RLSA-2024:4928 vom 2024-08-01","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6926-2","summary":"Ubuntu Security Notice USN-6926-2 vom 2024-08-01","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019090.html","summary":"SUSE Security Update SUSE-SU-2024:2722-1 vom 2024-08-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019091.html","summary":"SUSE Security Update SUSE-SU-2024:2719-1 vom 2024-08-02","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6895-4","summary":"Ubuntu Security Notice USN-6895-4 vom 2024-08-05","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019094.html","summary":"SUSE Security Update SUSE-SU-2024:2734-1 vom 2024-08-05","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019106.html","summary":"SUSE Security Update SUSE-SU-2024:2724-1 vom 2024-08-05","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019096.html","summary":"SUSE Security Update SUSE-SU-2024:2734-1 vom 2024-08-05","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019092.html","summary":"SUSE Security Update SUSE-SU-2024:2740-1 vom 2024-08-05","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019093.html","summary":"SUSE Security Update SUSE-SU-2024:2734-1 vom 2024-08-05","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019099.html","summary":"SUSE Security Update SUSE-SU-2024:2750-1 vom 2024-08-05","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019105.html","summary":"SUSE Security Update SUSE-SU-2024:2725-1 vom 2024-08-05","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019097.html","summary":"SUSE Security Update SUSE-SU-2024:2755-1 vom 2024-08-05","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019095.html","summary":"SUSE Security Update SUSE-SU-2024:2734-1 vom 2024-08-05","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019098.html","summary":"SUSE Security Update SUSE-SU-2024:2751-1 vom 2024-08-05","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019108.html","summary":"SUSE Security Update SUSE-SU-2024:2759-1 vom 2024-08-06","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019107.html","summary":"SUSE Security Update SUSE-SU-2024:2760-1 vom 2024-08-06","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019109.html","summary":"SUSE Security Update SUSE-SU-2024:2758-1 vom 2024-08-06","category":"external"},{"url":"https://www.dell.com/support/kbdoc/de-de/000227573/dsa-2024-348-security-update-for-dell-avamar-dell-networker-virtual-edition-nve-and-dell-powerprotect-dp-series-appliance-dell-integrated-data-protection-appliance-idpa-security-update-for-multiple-vulnerabilities","summary":"Dell Security Advisory DSA-2024-348 vom 2024-08-06","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019112.html","summary":"SUSE Security Update SUSE-SU-2024:2773-1 vom 2024-08-06","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019116.html","summary":"SUSE Security Update SUSE-SU-2024:2792-1 vom 2024-08-06","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019113.html","summary":"SUSE Security Update SUSE-SU-2024:2771-1 vom 2024-08-06","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019123.html","summary":"SUSE Security Update SUSE-SU-2024:2797-1 vom 2024-08-06","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5066","summary":"Red Hat Security Advisory RHSA-2024:5066 vom 2024-08-07","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019117.html","summary":"SUSE Security Update SUSE-SU-2024:2793-1 vom 2024-08-06","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5065","summary":"Red Hat Security Advisory RHSA-2024:5065 vom 2024-08-07","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5067","summary":"Red Hat Security Advisory RHSA-2024:5067 vom 2024-08-07","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html","summary":"SUSE Security Update SUSE-SU-2024:2802-1 vom 2024-08-07","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019135.html","summary":"SUSE Security Update SUSE-SU-2024:2815-1 vom 2024-08-07","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5101","summary":"Red Hat Security Advisory RHSA-2024:5101 vom 2024-08-08","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5102","summary":"Red Hat Security Advisory RHSA-2024:5102 vom 2024-08-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019152.html","summary":"SUSE Security Update SUSE-SU-2024:2824-1 vom 2024-08-08","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6952-1","summary":"Ubuntu Security Notice USN-6952-1 vom 2024-08-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019148.html","summary":"SUSE Security Update SUSE-SU-2024:2827-1 vom 2024-08-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019147.html","summary":"SUSE Security Update SUSE-SU-2024:2840-1 vom 2024-08-08","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6950-1","summary":"Ubuntu Security Notice USN-6950-1 vom 2024-08-09","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6953-1","summary":"Ubuntu Security Notice USN-6953-1 vom 2024-08-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019156.html","summary":"SUSE Security Update SUSE-SU-2024:2818-1 vom 2024-08-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019155.html","summary":"SUSE Security Update SUSE-SU-2024:2821-1 vom 2024-08-08","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6951-1","summary":"Ubuntu Security Notice USN-6951-1 vom 2024-08-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019151.html","summary":"SUSE Security Update SUSE-SU-2024:2825-1 vom 2024-08-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019146.html","summary":"SUSE Security Update SUSE-SU-2024:2841-1 vom 2024-08-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019154.html","summary":"SUSE Security Update SUSE-SU-2024:2822-1 vom 2024-08-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019145.html","summary":"SUSE Security Update SUSE-SU-2024:2843-1 vom 2024-08-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019144.html","summary":"SUSE Security Update SUSE-SU-2024:2850-1 vom 2024-08-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019143.html","summary":"SUSE Security Update SUSE-SU-2024:2851-1 vom 2024-08-08","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6949-1","summary":"Ubuntu Security Notice USN-6949-1 vom 2024-08-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019153.html","summary":"SUSE Security Update SUSE-SU-2024:2823-1 vom 2024-08-08","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-5101.html","summary":"Oracle Linux Security Advisory ELSA-2024-5101 vom 2024-08-09","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6926-3","summary":"Ubuntu Security Notice USN-6926-3 vom 2024-08-09","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6950-2","summary":"Ubuntu Security Notice USN-6950-2 vom 2024-08-13","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6956-1","summary":"Ubuntu Security Notice USN-6956-1 vom 2024-08-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019175.html","summary":"SUSE Security Update SUSE-SU-2024:2874-1 vom 2024-08-12","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5256","summary":"Red Hat Security Advisory RHSA-2024:5256 vom 2024-08-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5255","summary":"Red Hat Security Advisory RHSA-2024:5255 vom 2024-08-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5257","summary":"Red Hat Security Advisory RHSA-2024:5257 vom 2024-08-13","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6955-1","summary":"Ubuntu Security Notice USN-6955-1 vom 2024-08-12","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5266","summary":"Red Hat Security Advisory RHSA-2024:5266 vom 2024-08-13","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6957-1","summary":"Ubuntu Security Notice USN-6957-1 vom 2024-08-13","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-12581.html","summary":"Oracle Linux Security Advisory ELSA-2024-12581 vom 2024-08-13","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-12585.html","summary":"Oracle Linux Security Advisory ELSA-2024-12585 vom 2024-08-13","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-12584.html","summary":"Oracle Linux Security Advisory ELSA-2024-12584 vom 2024-08-13","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6949-2","summary":"Ubuntu Security Notice USN-6949-2 vom 2024-08-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html","summary":"SUSE Security Update SUSE-SU-2024:2892-1 vom 2024-08-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5282","summary":"Red Hat Security Advisory RHSA-2024:5282 vom 2024-08-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019182.html","summary":"SUSE Security Update SUSE-SU-2024:2894-1 vom 2024-08-13","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6950-3","summary":"Ubuntu Security Notice USN-6950-3 vom 2024-08-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html","summary":"SUSE Security Update SUSE-SU-2024:2896-1 vom 2024-08-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5281","summary":"Red Hat Security Advisory RHSA-2024:5281 vom 2024-08-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5363","summary":"Red Hat Security Advisory RHSA-2024:5363 vom 2024-08-14","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5364","summary":"Red Hat Security Advisory RHSA-2024:5364 vom 2024-08-14","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5365","summary":"Red Hat Security Advisory RHSA-2024:5365 vom 2024-08-14","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6952-2","summary":"Ubuntu Security Notice USN-6952-2 vom 2024-08-13","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6951-2","summary":"Ubuntu Security Notice USN-6951-2 vom 2024-08-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019194.html","summary":"SUSE Security Update SUSE-SU-2024:2901-1 vom 2024-08-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019193.html","summary":"SUSE Security Update SUSE-SU-2024:2902-1 vom 2024-08-14","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-5363.html","summary":"Oracle Linux Security Advisory ELSA-2024-5363 vom 2024-08-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html","summary":"SUSE Security Update SUSE-SU-2024:2923-1 vom 2024-08-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019209.html","summary":"SUSE Security Update SUSE-SU-2024:2929-1 vom 2024-08-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html","summary":"SUSE Security Update SUSE-SU-2024:2939-1 vom 2024-08-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019220.html","summary":"SUSE Security Update SUSE-SU-2024:2947-1 vom 2024-08-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019212.html","summary":"SUSE Security Update SUSE-SU-2024:2940-1 vom 2024-08-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html","summary":"SUSE Security Update SUSE-SU-2024:2948-1 vom 2024-08-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html","summary":"SUSE Security Update SUSE-SU-2024:2203-1 vom 2024-08-19","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6951-3","summary":"Ubuntu Security Notice USN-6951-3 vom 2024-08-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html","summary":"SUSE Security Update SUSE-SU-2024:2973-1 vom 2024-08-20","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5672","summary":"Red Hat Security Advisory RHSA-2024:5672 vom 2024-08-21","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5673","summary":"Red Hat Security Advisory RHSA-2024:5673 vom 2024-08-21","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6972-1","summary":"Ubuntu Security Notice USN-6972-1 vom 2024-08-21","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2024:5102","summary":"Rocky Linux Security Advisory RLSA-2024:5102 vom 2024-08-21","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5692","summary":"Red Hat Security Advisory RHSA-2024:5692 vom 2024-08-21","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2024:5101","summary":"Rocky Linux Security Advisory RLSA-2024:5101 vom 2024-08-21","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6951-4","summary":"Ubuntu Security Notice USN-6951-4 vom 2024-08-21","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6950-4","summary":"Ubuntu Security Notice USN-6950-4 vom 2024-08-21","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6979-1","summary":"Ubuntu Security Notice USN-6979-1 vom 2024-08-22","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6972-2","summary":"Ubuntu Security Notice USN-6972-2 vom 2024-08-22","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6972-3","summary":"Ubuntu Security Notice USN-6973-2 vom 2024-08-23","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019309.html","summary":"SUSE Security Update SUSE-SU-2024:3015-1 vom 2024-08-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019320.html","summary":"SUSE Security Update SUSE-SU-2024:3048-1 vom 2024-08-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019321.html","summary":"SUSE Security Update SUSE-SU-2024:3044-1 vom 2024-08-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019315.html","summary":"SUSE Security Update SUSE-SU-2024:3034-1 vom 2024-08-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019322.html","summary":"SUSE Security Update SUSE-SU-2024:3043-1 vom 2024-08-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019324.html","summary":"SUSE Security Update SUSE-SU-2024:3039-1 vom 2024-08-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019326.html","summary":"SUSE Security Update SUSE-SU-2024:3037-1 vom 2024-08-27","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6972-4","summary":"Ubuntu Security Notice USN-6972-4 vom 2024-08-29","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5928","summary":"Red Hat Security Advisory RHSA-2024:5928 vom 2024-08-28","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-5928.html","summary":"Oracle Linux Security Advisory ELSA-2024-5928 vom 2024-08-29","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-12606.html","summary":"Oracle Linux Security Advisory ELSA-2024-12606 vom 2024-09-03","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:6268","summary":"Red Hat Security Advisory RHSA-2024:6268 vom 2024-09-04","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:6267","summary":"Red Hat Security Advisory RHSA-2024:6267 vom 2024-09-04","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:6206","summary":"Red Hat Security Advisory RHSA-2024:6206 vom 2024-09-03","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:6297","summary":"Red Hat Security Advisory RHSA-2024:6297 vom 2024-09-04","category":"external"},{"url":"https://oss.oracle.com/pipermail/oraclevm-errata/2024-September/001099.html","summary":"ORACLE OVMSA-2024-0011 vom 2024-09-04","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7167662","summary":"IBM Security Bulletin 7167662 vom 2024-09-05","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019407.html","summary":"SUSE Security Update SUSE-SU-2024:3195-1 vom 2024-09-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019400.html","summary":"SUSE Security Update SUSE-SU-2024:3194-1 vom 2024-09-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html","summary":"SUSE Security Update SUSE-SU-2024:3190-1 vom 2024-09-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html","summary":"SUSE Security Update SUSE-SU-2024:3189-1 vom 2024-09-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:6567","summary":"Red Hat Security Advisory RHSA-2024:6567 vom 2024-09-11","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YNWVZVIFSX7PLBJX3I3PDZ4MIBERTN2Y/","summary":"SUSE Security Update SUSE-SU-2024:3209-1 vom 2024-09-11","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-6567.html","summary":"Oracle Linux Security Advisory ELSA-2024-6567 vom 2024-09-12","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7007-1","summary":"Ubuntu Security Notice USN-7007-1 vom 2024-09-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019435.html","summary":"SUSE Security Update SUSE-SU-2024:3251-1 vom 2024-09-16","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2024:6567","summary":"Rocky Linux Security Advisory RLSA-2024:6567 vom 2024-09-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019436.html","summary":"SUSE Security Update SUSE-SU-2024:3252-1 vom 2024-09-16","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2024-054.html","summary":"Amazon Linux Security Advisory ALASKERNEL-5.15-2024-054 vom 2024-09-18","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:6753","summary":"Red Hat Security Advisory RHSA-2024:6753 vom 2024-09-18","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS-2024-2633.html","summary":"Amazon Linux Security Advisory ALAS-2024-2633 vom 2024-09-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019458.html","summary":"SUSE Security Update SUSE-SU-2024:3321-1 vom 2024-09-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019461.html","summary":"SUSE Security Update SUSE-SU-2024:3318-1 vom 2024-09-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019478.html","summary":"SUSE Security Update SUSE-SU-2024:3347-1 vom 2024-09-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019468.html","summary":"SUSE Security Update SUSE-SU-2024:3336-1 vom 2024-09-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019477.html","summary":"SUSE Security Update SUSE-SU-2024:3348-1 vom 2024-09-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html","summary":"SUSE Security Update SUSE-SU-2024:3379-1 vom 2024-09-23","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019492.html","summary":"SUSE Security Update SUSE-SU-2024:3361-1 vom 2024-09-23","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019491.html","summary":"SUSE Security Update SUSE-SU-2024:3363-1 vom 2024-09-23","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html","summary":"SUSE Security Update SUSE-SU-2024:3368-1 vom 2024-09-23","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019486.html","summary":"SUSE Security Update SUSE-SU-2024:3375-1 vom 2024-09-23","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019487.html","summary":"SUSE Security Update SUSE-SU-2024:3370-1 vom 2024-09-23","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019490.html","summary":"SUSE Security Update SUSE-SU-2024:3365-1 vom 2024-09-23","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7007-2","summary":"Ubuntu Security Notice USN-7007-2 vom 2024-09-23","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html","summary":"SUSE Security Update SUSE-SU-2024:3383-1 vom 2024-09-23","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7169778","summary":"IBM Security Bulletin 7169778 vom 2024-09-24","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7007-3","summary":"Ubuntu Security Notice USN-7007-3 vom 2024-09-23","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:7001","summary":"Red Hat Security Advisory RHSA-2024:7001 vom 2024-09-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019494.html","summary":"SUSE Security Update SUSE-SU-2024:3395-1 vom 2024-09-23","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:6997","summary":"Red Hat Security Advisory RHSA-2024:6997 vom 2024-09-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html","summary":"SUSE Security Update SUSE-SU-2024:3399-1 vom 2024-09-23","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:6993","summary":"Red Hat Security Advisory RHSA-2024:6993 vom 2024-09-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019498.html","summary":"SUSE Security Update SUSE-SU-2024:3405-1 vom 2024-09-23","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:7000","summary":"Red Hat Security Advisory RHSA-2024:7000 vom 2024-09-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019512.html","summary":"SUSE Security Update SUSE-SU-2024:3425-1 vom 2024-09-24","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-7000.html","summary":"Oracle Linux Security Advisory ELSA-2024-7000 vom 2024-09-26","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-6997.html","summary":"Oracle Linux Security Advisory ELSA-2024-6997 vom 2024-09-26","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2HO244EHQ65DPDJ2NOBAXLG7QYWSCUMA/","summary":"SUSE Security Update SUSE-SU-2024:3483-1 vom 2024-09-29","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/2HO244EHQ65DPDJ2NOBAXLG7QYWSCUMA/","summary":"SUSE Security Update SUSE-SU-2024:3483-1 vom 2024-09-29","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2024:7001","summary":"Rocky Linux Security Advisory RLSA-2024:7001 vom 2024-09-30","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:7489","summary":"Red Hat Security Advisory RHSA-2024:7489 vom 2024-10-02","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:7490","summary":"Red Hat Security Advisory RHSA-2024:7490 vom 2024-10-02","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-12700.html","summary":"Oracle Linux Security Advisory ELSA-2024-12700 vom 2024-10-01","category":"external"},{"url":"https://oss.oracle.com/pipermail/oraclevm-errata/2024-October/001101.html","summary":"ORACLE OVMSA-2024-0013 vom 2024-10-03","category":"external"},{"url":"https://lists.debian.org/debian-security-announce/2024/msg00195.html","summary":"Debian Security Advisory DSA-5782 vom 2024-10-03","category":"external"},{"url":"https://www.dell.com/support/kbdoc/de-de/000234730/dsa-2024-422-security-update-for-dell-networker-vproxy-multiple-component-vulnerabilities","summary":"Dell Security Advisory DSA-2024-422 vom 2024-10-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:8107","summary":"Red Hat Security Advisory RHSA-2024:8107 vom 2024-10-15","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/V4GVQWREKLT3NIX5GMPMO26GXLKRGTXJ/","summary":"SUSE Security Update SUSE-SU-2024:3624-1 vom 2024-10-15","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/XCWDJ4VQNWRMZU52FZIMVKO3ZX7QR3L7/","summary":"SUSE Security Update SUSE-SU-2024:3625-1 vom 2024-10-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-October/019596.html","summary":"SUSE Security Update SUSE-SU-2024:3628-1 vom 2024-10-15","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7069-1","summary":"Ubuntu Security Notice USN-7069-1 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VBN5S6CN75ZWGV3ZNRLZRMQ5DF3HMBZE/","summary":"SUSE Security Update SUSE-SU-2024:3631-1 vom 2024-10-15","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:8161","summary":"Red Hat Security Advisory RHSA-2024:8161 vom 2024-10-16","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:8162","summary":"Red Hat Security Advisory RHSA-2024:8162 vom 2024-10-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html","summary":"SUSE Security Update SUSE-SU-2024:3642-1 vom 2024-10-15","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/G5I2ZVAM4BJDGCYJE64AKFTDGHVIU5SH/","summary":"SUSE Security Update SUSE-SU-2024:3638-1 vom 2024-10-15","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/IMA2L435Y3DOAG6IL6IEIK2SUGPOUZXD/","summary":"SUSE Security Update SUSE-SU-2024:3632-1 vom 2024-10-15","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/BL3RXEW5VDVX6HS5GR4KUH6GDRT5OFQF/","summary":"SUSE Security Update SUSE-SU-2024:3635-1 vom 2024-10-15","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QREDIZHMC5MCDU7XHJHAPFFVPPIKTHWD/","summary":"SUSE Security Update SUSE-SU-2024:3639-1 vom 2024-10-15","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VPMT5STAWY6BTO5OI2PZ7CG4AXOIQKZN/","summary":"SUSE Security Update SUSE-SU-2024:3643-1 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/MGSVPDAL2ET3FWE6YAGBX3UOQOVXTPXB/","summary":"SUSE Security Update SUSE-SU-2024:3672-1 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LI6Q2FNQZMLDTI4OK3SIOBF2CXJW5I56/","summary":"SUSE Security Update SUSE-SU-2024:3661-1 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/MOG44NUGCSJS6Q3AKMCV3X4IK2DN6CLL/","summary":"SUSE Security Update SUSE-SU-2024:3695-1 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YYPGEHXE3QJ5NBRD57VSRTM36AC5DISM/","summary":"SUSE Security Update SUSE-SU-2024:3696-1 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/EUYMTMU2SZQY2ZOCLHCYEZ2A2LJUYBHS/","summary":"SUSE Security Update SUSE-SU-2024:3666-1 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/XAOP5G7ENALTQ2BLIJROCRJ3STRXQOFY/","summary":"SUSE Security Update SUSE-SU-2024:3652-1 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/A6BRGXRVSUAODD2ZZSX5GJCV46W4N5YB/","summary":"SUSE Security Update SUSE-SU-2024:3697-1 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VLAP2QXVEHLNNWBLHF53IAVX5KBCFJGW/","summary":"SUSE Security Update SUSE-SU-2024:3651-1 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/Y2P3R5HQ4Z7AYZLBXUGXBJMITFENT5NV/","summary":"SUSE Security Update SUSE-SU-2024:3694-1 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/SVZDNTNDPAUIILRXFRA47BDSDZ3IUQTH/","summary":"SUSE Security Update SUSE-SU-2024:3701-1 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/G3EDKBVPHAPKDJ45CNEJLJ4KGJAHJ4R7/","summary":"SUSE Security Update SUSE-SU-2024:3700-1 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/JVBPTC5SNYDIYERI2QA3SDI56HZRXTU4/","summary":"SUSE Security Update SUSE-SU-2024:3670-1 vom 2024-10-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-October/019619.html","summary":"SUSE Security Update SUSE-SU-2024:3649-1 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/TJEVBYA7IDQFKVP2IAJ5BZJLYZD7EOVP/","summary":"SUSE Security Update SUSE-SU-2024:3690-1 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YCRSFR3VCO3HMO5RI5MPP5LW6AJRWVBW/","summary":"SUSE Security Update SUSE-SU-2024:3648-1 vom 2024-10-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html","summary":"SUSE Security Update SUSE-SU-2024:3662-1 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/RDWWWR2VCADWSQCCZNNFB4VWOMZDOC63/","summary":"SUSE Security Update SUSE-SU-2024:3679-1 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/P4LIA2SNUYEEYDFH7Q72CHUMA7X4NIY3/","summary":"SUSE Security Update SUSE-SU-2024:3655-1 vom 2024-10-16","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-8162.html","summary":"Oracle Linux Security Advisory ELSA-2024-8162 vom 2024-10-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-October/019624.html","summary":"SUSE Security Update SUSE-SU-2024:3663-1 vom 2024-10-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-October/019642.html","summary":"SUSE Security Update SUSE-SU-2024:3674-1 vom 2024-10-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-October/019641.html","summary":"SUSE Security Update SUSE-SU-2024:3676-1 vom 2024-10-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/IUM757WJ43K7PF2K6A3UQHWG2QALK24F/","summary":"SUSE Security Update SUSE-SU-2024:3706-1 vom 2024-10-17","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/CLMHYECK5YKZDDXZ7XKEL3G5JXCF5QRM/","summary":"SUSE Security Update SUSE-SU-2024:3710-1 vom 2024-10-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7069-2","summary":"Ubuntu Security Notice USN-7069-2 vom 2024-10-17","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-12796.html","summary":"Oracle Linux Security Advisory ELSA-2024-12796 vom 2024-10-21","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7173960","summary":"IBM Security Bulletin 7173960 vom 2024-10-23","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:8318","summary":"Red Hat Security Advisory RHSA-2024:8318 vom 2024-10-23","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2024:8162","summary":"Rocky Linux Security Advisory RLSA-2024:8162 vom 2024-10-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-October/019682.html","summary":"SUSE Security Update SUSE-SU-2024:3767-1 vom 2024-10-29","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JBARQYJ6M5ZO2ZPYF6F55DX3BXLKEQMT/","summary":"SUSE Security Update SUSE-SU-2024:3783-1 vom 2024-10-30","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRFC54YJNAIE647NXDXGDHFV6UDF5EPM/","summary":"SUSE Security Update SUSE-SU-2024:3780-1 vom 2024-10-30","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EZDCNRY3OUDL3J55URFZK4CF6EMUGZ5C/","summary":"SUSE Security Update SUSE-SU-2024:3777-1 vom 2024-10-29","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/JBARQYJ6M5ZO2ZPYF6F55DX3BXLKEQMT/","summary":"SUSE Security Update SUSE-SU-2024:3783-1 vom 2024-10-30","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/ZRFC54YJNAIE647NXDXGDHFV6UDF5EPM/","summary":"SUSE Security Update SUSE-SU-2024:3780-1 vom 2024-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-October/019686.html","summary":"SUSE Security Update SUSE-SU-2024:3774-1 vom 2024-10-29","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-October/019695.html","summary":"SUSE Security Update SUSE-SU-2024:3782-1 vom 2024-10-30","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/RMOWLUMWUZKBWNWZRVPCJY43YUOMCMJ7/","summary":"SUSE Security Update SUSE-SU-2024:3829-1 vom 2024-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-October/019703.html","summary":"SUSE Security Update SUSE-SU-2024:3799-1 vom 2024-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html","summary":"SUSE Security Update SUSE-SU-2024:3796-1 vom 2024-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-October/019699.html","summary":"SUSE Security Update SUSE-SU-2024:3797-1 vom 2024-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-October/019729.html","summary":"SUSE Security Update SUSE-SU-2024:3821-1 vom 2024-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-October/019701.html","summary":"SUSE Security Update SUSE-SU-2024:3794-1 vom 2024-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html","summary":"SUSE Security Update SUSE-SU-2024:3798-1 vom 2024-10-30","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/5FIXDPPFE66BKRWS3X45YHODJJ57FQRT/","summary":"SUSE Security Update SUSE-SU-2024:3830-1 vom 2024-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html","summary":"SUSE Security Update SUSE-SU-2024:3793-1 vom 2024-10-30","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/6AZ2YKRZXCGZLO3DU6DW532FYLNVDCGU/","summary":"SUSE Security Update SUSE-SU-2024:3805-1 vom 2024-10-30","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/GZWABRNLCUO6HRO6LFOXTIBDSFGOTSYD/","summary":"SUSE Security Update SUSE-SU-2024:3804-1 vom 2024-10-30","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/I22FOLEFZIBTJBTIPHH5GXPKMIXVDSDI/","summary":"SUSE Security Update SUSE-SU-2024:3806-1 vom 2024-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-October/019731.html","summary":"SUSE Security Update SUSE-SU-2024:3816-1 vom 2024-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-October/019728.html","summary":"SUSE Security Update SUSE-SU-2024:3822-1 vom 2024-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-October/019722.html","summary":"SUSE Security Update SUSE-SU-2024:3834-1 vom 2024-10-30","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QK6PZZGVJB6TX4W6LKJNJW74SGTITNGD/","summary":"SUSE Security Update SUSE-SU-2024:3831-1 vom 2024-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-October/019714.html","summary":"SUSE Security Update SUSE-SU-2024:3800-1 vom 2024-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html","summary":"SUSE Security Update SUSE-SU-2024:3820-1 vom 2024-10-30","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QW54KPSGGX7Q3N4CIMSAGZRZY4WGZV2D/","summary":"SUSE Security Update SUSE-SU-2024:3814-1 vom 2024-10-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html","summary":"SUSE Security Update SUSE-SU-2024:3803-1 vom 2024-10-30","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VHXZ2BQRCVWQY2AVSULS6AN56SITZ273/","summary":"SUSE Security Update SUSE-SU-2024:3837-1 vom 2024-10-30","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/S6IC3XKGED2IZ3RSTDHSMPUKMPV4R4FC/","summary":"SUSE Security Update SUSE-SU-2024:3824-1 vom 2024-10-30","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/IVMUBWV57LJO735WTA67PNJDTJXS5OOY/","summary":"SUSE Security Update SUSE-SU-2024:3838-1 vom 2024-10-31","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VVJDY73ZQLYG6XTLPXQKV6DOXIBCWQNH/","summary":"SUSE Security Update SUSE-SU-2024:3842-1 vom 2024-10-31","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/UFUASUPHAEZFWXKIMGZLIZD4LHGMJ5YW/","summary":"SUSE Security Update SUSE-SU-2024:3860-1 vom 2024-10-31","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7088-1","summary":"Ubuntu Security Notice USN-7088-1 vom 2024-10-31","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-October/019743.html","summary":"SUSE Security Update SUSE-SU-2024:3848-1 vom 2024-10-31","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/7YDAYBSAUUUZVVIKYWRRX5O6ZCOQ2K46/","summary":"SUSE Security Update SUSE-SU-2024:3851-1 vom 2024-10-31","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/DM3QIZHKHG7AW6EAKKMMWCCUOYK4JU3R/","summary":"SUSE Security Update SUSE-SU-2024:3857-1 vom 2024-10-31","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/I2YJKGZHLOSZMF6JYHDKXI5OARZUMTEY/","summary":"SUSE Security Update SUSE-SU-2024:3859-1 vom 2024-10-31","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/KSMKB243YKTE3C2SGCFXBMVAT6CUYWVH/","summary":"SUSE Security Update SUSE-SU-2024:3850-1 vom 2024-10-31","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html","summary":"SUSE Security Update SUSE-SU-2024:3849-1 vom 2024-10-31","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/HVT4PHTMBZOBVPW2CI26GVIVJNWCBTVN/","summary":"SUSE Security Update SUSE-SU-2024:3855-1 vom 2024-10-31","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/CJCHUFTBOJTQRE24NTRP6WMCK5BGPZ3N/","summary":"SUSE Security Update SUSE-SU-2024:3852-1 vom 2024-10-31","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/6DKQ4KINQ5TXHK6JA63O3YINMJXE2QVJ/","summary":"SUSE Security Update SUSE-SU-2024:3854-1 vom 2024-10-31","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7174634","summary":"IBM Security Bulletin","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/4FKA7N5AUZ6CDGAARMRU76MNKUZHMPAH/","summary":"SUSE Security Update SUSE-SU-2024:3880-1 vom 2024-11-04","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:8856","summary":"Red Hat Security Advisory RHSA-2024:8856 vom 2024-11-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:8870","summary":"Red Hat Security Advisory RHSA-2024:8870 vom 2024-11-05","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7088-2","summary":"Ubuntu Security Notice USN-7088-2 vom 2024-11-04","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-8856.html","summary":"Oracle Linux Security Advisory ELSA-2024-8856 vom 2024-11-06","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7088-3","summary":"Ubuntu Security Notice USN-7088-3 vom 2024-11-06","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2024:8870","summary":"Rocky Linux Security Advisory RLSA-2024:8870 vom 2024-11-08","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:9315","summary":"Red Hat Security Advisory RHSA-2024:9315 vom 2024-11-12","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/CIC23R3UQSPF2K4P2CX54TPCX5T7KWQG/","summary":"SUSE Security Update SUSE-SU-2024:3986-1 vom 2024-11-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:9546","summary":"Red Hat Security Advisory RHSA-2024:9546 vom 2024-11-13","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/L52VEDNTEHWEPR56WZN4KZNMEUYGCJX6/","summary":"SUSE Security Update SUSE-SU-2024:3984-1 vom 2024-11-13","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-073.html","summary":"Amazon Linux Security Advisory ALASKERNEL-5.10-2024-073 vom 2024-11-13","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7088-5","summary":"Ubuntu Security Notice USN-7088-5 vom 2024-11-14","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7110-1","summary":"Ubuntu Security Notice USN-7110-1 vom 2024-11-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-November/019838.html","summary":"SUSE Security Update SUSE-SU-2024:4038-1 vom 2024-11-19","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7119-1","summary":"Ubuntu Security Notice USN-7119-1 vom 2024-11-20","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7121-1","summary":"Ubuntu Security Notice USN-7121-1 vom 2024-11-20","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-12830.html","summary":"Oracle Linux Security Advisory ELSA-2024-12830 vom 2024-11-21","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7176961","summary":"IBM Security Bulletin 7176961 vom 2024-11-22","category":"external"},{"url":"https://lists.debian.org/debian-security-announce/2024/msg00233.html","summary":"Debian Security Advisory DSA-5818 vom 2024-11-24","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7121-3","summary":"Ubuntu Security Notice USN-7121-3 vom 2024-11-25","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:10262","summary":"Red Hat Security Advisory RHSA-2024:10262 vom 2024-11-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019888.html","summary":"SUSE Security Update SUSE-SU-2024:4141-1 vom 2024-12-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019880.html","summary":"SUSE Security Update SUSE-SU-2024:4128-1 vom 2024-12-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html","summary":"SUSE Security Update SUSE-SU-2024:4123-1 vom 2024-12-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019889.html","summary":"SUSE Security Update SUSE-SU-2024:4139-1 vom 2024-12-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html","summary":"SUSE Security Update SUSE-SU-2024:4125-1 vom 2024-12-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019886.html","summary":"SUSE Security Update SUSE-SU-2024:4120-1 vom 2024-12-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019879.html","summary":"SUSE Security Update SUSE-SU-2024:4129-1 vom 2024-12-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019881.html","summary":"SUSE Security Update SUSE-SU-2024:4127-1 vom 2024-12-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html","summary":"SUSE Security Update SUSE-SU-2024:4124-1 vom 2024-12-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html","summary":"SUSE Security Update SUSE-SU-2024:4122-1 vom 2024-12-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019913.html","summary":"SUSE Security Update SUSE-SU-2024:4170-1 vom 2024-12-04","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/3ACAYSLQECATBMYSIXEOONW3SJQYVWGD/","summary":"SUSE Security Update SUSE-SU-2024:4180-1 vom 2024-12-05","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/67TGK2LDMDGINETA7HTYVAUONB6OAZD5/","summary":"SUSE Security Update SUSE-SU-2024:4210-1 vom 2024-12-05","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019927.html","summary":"SUSE Security Update SUSE-SU-2024:4197-1 vom 2024-12-05","category":"external"},{"url":"http://linux.oracle.com/errata/ELSA-2024-12851.html","summary":"Oracle Linux Security Advisory ELSA-2024-12851 vom 2024-12-05","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/5LS3ZVBG6LNL6BFVLEKSCPDDZTE7XQIS/","summary":"SUSE Security Update SUSE-SU-2024:4220-1 vom 2024-12-06","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/4UVNDL3CU4NHVPE7QELR2N5HRCDSMYEV/","summary":"SUSE Security Update SUSE-SU-2024:4218-1 vom 2024-12-06","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/M53UYAMNDLCCFQJMB3EWLVYJENF2J65Z/","summary":"SUSE Security Update SUSE-SU-2024:4217-1 vom 2024-12-05","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/P4UZ4KLYIQHACIYR7LE2ANITUCPLWFYS/","summary":"SUSE Security Update SUSE-SU-2024:4214-1 vom 2024-12-05","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/KZC5ZXKVE5JSNEKEAICAO52WN7SOJCTX/","summary":"SUSE Security Update SUSE-SU-2024:4216-1 vom 2024-12-05","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019928.html","summary":"SUSE Security Update SUSE-SU-2024:4195-1 vom 2024-12-05","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VJP47EXIE7RQJ2MRSR6HYMNI52GICWOP/","summary":"SUSE Security Update SUSE-SU-2024:4209-1 vom 2024-12-05","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/FSWHAR4P5O4W4NVL7QLKN3Y3Z6UJX4CO/","summary":"SUSE Security Update SUSE-SU-2024:4206-1 vom 2024-12-05","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/HJOOCIMJWVQXHEUVET7W2XBWXJY6XR6M/","summary":"SUSE Security Update SUSE-SU-2024:4208-1 vom 2024-12-05","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/KHOJJYPB3I2C5FKMLHD5WFCQI342KAXA/","summary":"SUSE Security Update SUSE-SU-2024:4207-1 vom 2024-12-05","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019940.html","summary":"SUSE Security Update SUSE-SU-2024:4219-1 vom 2024-12-06","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html","summary":"SUSE Security Update SUSE-SU-2024:4242-1 vom 2024-12-06","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/R6NJTIPCJBC7ULVGL3ST3ZEMPJQ6UE7K/","summary":"SUSE Security Update SUSE-SU-2024:4227-1 vom 2024-12-06","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LIMMCWFWYJUMJTABZZ7ZEYXOOVE5BZY7/","summary":"SUSE Security Update SUSE-SU-2024:4235-1 vom 2024-12-06","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html","summary":"SUSE Security Update SUSE-SU-2024:4226-1 vom 2024-12-06","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/GDL3TRRFKGYVQIW7MMTUJS76GCW7B3JZ/","summary":"SUSE Security Update SUSE-SU-2024:4243-1 vom 2024-12-06","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019946.html","summary":"SUSE Security Update SUSE-SU-2024:4231-1 vom 2024-12-06","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/3LFFLGXO55CBY4WD74GYLL6CL2HWJM2Q/","summary":"SUSE Security Update SUSE-SU-2024:4246-1 vom 2024-12-06","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/34BVCDIDBQSXQ6Y3TVDGD4FSZ7N3D3LI/","summary":"SUSE Security Update SUSE-SU-2024:4256-1 vom 2024-12-06","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html","summary":"SUSE Security Update SUSE-SU-2024:4250-1 vom 2024-12-06","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/ODASOBSBN3UUGHNO44MK2K4MC35CPLXJ/","summary":"SUSE Security Update SUSE-SU-2024:4236-1 vom 2024-12-06","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/B6RMLGICBLD3BNXSBS7J23W3GCEJMFJA/","summary":"SUSE Security Update SUSE-SU-2024:4234-1 vom 2024-12-06","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html","summary":"SUSE Security Update SUSE-SU-2024:4249-1 vom 2024-12-06","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019961.html","summary":"SUSE Security Update SUSE-SU-2024:4239-1 vom 2024-12-06","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html","summary":"SUSE Security Update SUSE-SU-2024:4263-1 vom 2024-12-09","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/SZPUHL7SUZ57L3OJFO25IHYVDJ76ONGC/","summary":"SUSE Security Update SUSE-SU-2024:4264-1 vom 2024-12-09","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RRJRAM3LFR4MNOHCFB2XIOS6OJUDNUPE/","summary":"SUSE Security Update SUSE-SU-2024:4266-1 vom 2024-12-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019973.html","summary":"SUSE Security Update SUSE-SU-2024:4261-1 vom 2024-12-09","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YTZ2WGLML4Q6E3IG32UCJ6NFIDUTWN22/","summary":"SUSE Security Update SUSE-SU-2024:4275-1 vom 2024-12-10","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7148-1","summary":"Ubuntu Security Notice USN-7148-1 vom 2024-12-10","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YTZ2WGLML4Q6E3IG32UCJ6NFIDUTWN22/","summary":"SUSE Security Update SUSE-SU-2024:4275-1 vom 2024-12-10","category":"external"},{"url":"https://oss.oracle.com/pipermail/oraclevm-errata/2024-December/001104.html","summary":"ORACLE OVMSA-2024-0016 vom 2024-12-10","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7159-1","summary":"Ubuntu Security Notice USN-7159-1 vom 2024-12-12","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/S4I5Z6ALCJLHTP25U3HMJHEXN4DR2USM/","summary":"SUSE Security Update SUSE-SU-2024:4316-1 vom 2024-12-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html","summary":"SUSE Security Update SUSE-SU-2024:4318-1 vom 2024-12-13","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/SARXL66CQHD5VSFG5PUBNBVBPVFUN4KT/","summary":"SUSE Security Update SUSE-SU-2024:4314-1 vom 2024-12-13","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LQPWDP54GSTHYCV4CTCOE67D2ANVPPUW/","summary":"SUSE Security Update SUSE-SU-2024:4315-1 vom 2024-12-13","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7159-3","summary":"Ubuntu Security Notice USN-7159-2 vom 2024-12-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html","summary":"SUSE Security Update SUSE-SU-2024:4364-1 vom 2024-12-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7166-1","summary":"Ubuntu Security Notice USN-7166-1 vom 2024-12-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html","summary":"SUSE Security Update SUSE-SU-2024:4367-1 vom 2024-12-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7166-2","summary":"Ubuntu Security Notice USN-7159-2 vom 2024-12-18","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7173-1","summary":"Ubuntu Security Notice USN-7173-1 vom 2024-12-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7159-2","summary":"Ubuntu Security Notice USN-7159-2 vom 2024-12-17","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WFOJHFFEHK42VPQ6XLZWB77H5OEJ3FF4/","summary":"SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:11485","summary":"Red Hat Security Advisory RHSA-2024:11485 vom 2024-12-19","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/WFOJHFFEHK42VPQ6XLZWB77H5OEJ3FF4/","summary":"SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html","summary":"SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html","summary":"SUSE Security Update SUSE-SU-2024:4387-1 vom 2024-12-19","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-076.html","summary":"Amazon Linux Security Advisory ALASKERNEL-5.10-2024-076 vom 2024-12-19","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2024-058.html","summary":"Amazon Linux Security Advisory ALASKERNEL-5.15-2024-058 vom 2024-12-19","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7159-4","summary":"Ubuntu Security Notice USN-7159-4 vom 2024-12-20","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7166-3","summary":"Ubuntu Security Notice USN-7166-3 vom 2024-12-20","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7179-1","summary":"Ubuntu Security Notice USN-7179-1 vom 2024-12-20","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7173-2","summary":"Ubuntu Security Notice USN-7173-2 vom 2024-12-20","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html","summary":"Debian Security Advisory DLA-4008 vom 2025-01-03","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7186-1","summary":"Ubuntu Security Notice USN-7186-1 vom 2025-01-06","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7183-1","summary":"Ubuntu Security Notice USN-7183-1 vom 2025-01-06","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7184-1","summary":"Ubuntu Security Notice USN-7184-1 vom 2025-01-06","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7179-2","summary":"Ubuntu Security Notice USN-7179-2 vom 2025-01-06","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7159-5","summary":"Ubuntu Security Notice USN-7159-5 vom 2025-01-06","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7180361","summary":"IBM Security Bulletin 7180361 vom 2025-01-07","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7179-3","summary":"Ubuntu Security Notice USN-7179-3 vom 2025-01-07","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7180385","summary":"IBM Security Bulletin 7180385 vom 2025-01-07","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:0062","summary":"Red Hat Security Advisory RHSA-2025:0062 vom 2025-01-08","category":"external"},{"url":"https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-24-1R2-release","summary":"Juniper Security Advisory JSA92874 vom 2024-01-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html","summary":"SUSE Security Update SUSE-SU-2025:0035-1 vom 2025-01-08","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7194-1","summary":"Ubuntu Security Notice USN-7194-1 vom 2025-01-09","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7195-1","summary":"Ubuntu Security Notice USN-7195-1 vom 2025-01-09","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7186-2","summary":"Ubuntu Security Notice USN-7186-2 vom 2025-01-09","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7185-2","summary":"Ubuntu Security Notice USN-7185-2 vom 2025-01-09","category":"external"},{"url":"https://oss.oracle.com/pipermail/el-errata/2025-January/017000.html","summary":"Oracle Linux Security Advisory ELSA-2024-9315 vom 2025-01-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020104.html","summary":"SUSE Security Update SUSE-SU-2025:0084-1 vom 2025-01-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020102.html","summary":"SUSE Security Update SUSE-SU-2025:0089-1 vom 2025-01-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html","summary":"SUSE Security Update SUSE-SU-2025:0091-1 vom 2025-01-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020107.html","summary":"SUSE Security Update SUSE-SU-2025:0097-1 vom 2025-01-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html","summary":"SUSE Security Update SUSE-SU-2025:0101-1 vom 2025-01-14","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7195-2","summary":"Ubuntu Security Notice USN-7195-2 vom 2025-01-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html","summary":"SUSE Security Update SUSE-SU-2025:0103-1 vom 2025-01-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html","summary":"SUSE Security Update SUSE-SU-2025:0107-1 vom 2025-01-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html","summary":"SUSE Security Update SUSE-SU-2025:0109-1 vom 2025-01-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html","summary":"SUSE Security Update SUSE-SU-2025:0106-1 vom 2025-01-14","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/PLWCG227VUGPKNXHW6FOCW727UUPVLLU/","summary":"SUSE Security Update SUSE-SU-2025:0110-1 vom 2025-01-15","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VK2D63Q2FKHJWXOLVAS7HPIWURVL3MQQ/","summary":"SUSE Security Update SUSE-SU-2025:0115-1 vom 2025-01-15","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YC7MKFCHLBJHUQM2SLPOGVG4DUWP2J4E/","summary":"SUSE Security Update SUSE-SU-2025:0114-1 vom 2025-01-15","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7173-3","summary":"Ubuntu Security Notice USN-7173-3 vom 2025-01-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html","summary":"SUSE Security Update SUSE-SU-2025:0117-1 vom 2025-01-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html","summary":"SUSE Security Update SUSE-SU-2025:0124-1 vom 2025-01-15","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/NVEFJ5TKVGVJIR3Y7Y6XQIAGC5P5TTK7/","summary":"SUSE Security Update SUSE-SU-2025:0131-1 vom 2025-01-15","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YHBMZ4MND2ONRG4N26VJNJGAZBXMYEDV/","summary":"SUSE Security Update SUSE-SU-2025:0137-1 vom 2025-01-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/C6ANXHEO54VUUFEWI6QYB2M3L2SS7OOW/","summary":"SUSE Security Update SUSE-SU-2025:0146-1 vom 2025-01-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/USHZQFRYGMLVCVQRQLPH4FARDBDAEC6G/","summary":"SUSE Security Update SUSE-SU-2025:0150-1 vom 2025-01-16","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/ET3TDUWYDTZV554NRC7LB5HGM4TCIIGZ/","summary":"SUSE Security Update SUSE-SU-2025:0138-1 vom 2025-01-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html","summary":"SUSE Security Update SUSE-SU-2025:0154-1 vom 2025-01-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html","summary":"SUSE Security Update SUSE-SU-2025:0158-1 vom 2025-01-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html","summary":"SUSE Security Update SUSE-SU-2025:0153-1 vom 2025-01-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020165.html","summary":"SUSE Security Update SUSE-SU-2025:0168-1 vom 2025-01-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html","summary":"SUSE Security Update SUSE-SU-2025:0164-1 vom 2025-01-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020170.html","summary":"SUSE Security Update SUSE-SU-2025:0187-1 vom 2025-01-20","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020169.html","summary":"SUSE Security Update SUSE-SU-2025:0188-1 vom 2025-01-20","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YCBYAV5OJRXD362FDCZUSIHNHOURONCF/","summary":"SUSE Security Update SUSE-SU-2025:0240-1 vom 2025-01-27","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YNU4IXTEAXCI7QNPC2AVXZICYTGC4XXI/","summary":"SUSE Security Update SUSE-SU-2025:0238-1 vom 2025-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html","summary":"SUSE Security Update SUSE-SU-2025:0236-1 vom 2025-01-24","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VBKJOKHJGUZRHPVCGSRZVBF6ZMI7KJY7/","summary":"SUSE Security Update SUSE-SU-2025:0239-1 vom 2025-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html","summary":"SUSE Security Update SUSE-SU-2025:0231-1 vom 2025-01-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020224.html","summary":"SUSE Security Update SUSE-SU-2025:0265-1 vom 2025-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020212.html","summary":"SUSE Security Update SUSE-SU-2025:0255-1 vom 2025-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html","summary":"SUSE Security Update SUSE-SU-2025:0248-1 vom 2025-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html","summary":"SUSE Security Update SUSE-SU-2025:0249-1 vom 2025-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html","summary":"SUSE Security Update SUSE-SU-2025:0266-1 vom 2025-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020213.html","summary":"SUSE Security Update SUSE-SU-2025:0254-1 vom 2025-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html","summary":"SUSE Security Update SUSE-SU-2025:0252-1 vom 2025-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html","summary":"SUSE Security Update SUSE-SU-2025:0244-1 vom 2025-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020209.html","summary":"SUSE Security Update SUSE-SU-2025:0262-1 vom 2025-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html","summary":"SUSE Security Update SUSE-SU-2025:0253-1 vom 2025-01-27","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7179-4","summary":"Ubuntu Security Notice USN-7179-4 vom 2025-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html","summary":"SUSE Security Update SUSE-SU-2025:0264-1 vom 2025-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html","summary":"SUSE Security Update SUSE-SU-2025:0251-1 vom 2025-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html","summary":"SUSE Security Update SUSE-SU-2025:0260-1 vom 2025-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html","summary":"SUSE Security Update SUSE-SU-2025:0261-1 vom 2025-01-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020226.html","summary":"SUSE Security Update SUSE-SU-2025:0269-1 vom 2025-01-28","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html","summary":"SUSE Security Update SUSE-SU-2025:0289-1 vom 2025-01-29","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7181933","summary":"IBM Security Bulletin 7181933 vom 2025-01-29","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7182335","summary":"IBM Security Bulletin 7182335 vom 2025-02-03","category":"external"},{"url":"https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25416","summary":"Brocade Security Advisory BSA-2025-2889 vom 2025-02-13","category":"external"},{"url":"https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25398","summary":"Brocade Security Advisory BSA-2025-2895 vom 2025-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-February/020337.html","summary":"SUSE Security Update SUSE-SU-2025:0517-1 vom 2025-02-13","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7183378","summary":"IBM Security Bulletin 7183378 vom 2025-02-14","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:1658","summary":"Red Hat Security Advisory RHSA-2025:1658 vom 2025-02-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-February/020382.html","summary":"SUSE Security Update SUSE-SU-2025:0517-2 vom 2025-02-21","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-February/020383.html","summary":"SUSE Security Update SUSE-SU-2025:0603-1 vom 2025-02-21","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-February/020412.html","summary":"SUSE Security Update SUSE-SU-2025:0643-1 vom 2025-02-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-February/020411.html","summary":"SUSE Security Update SUSE-SU-2025:0645-1 vom 2025-02-24","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/K5ISL253VM5G7LDMVRZ5DOLRXZGOEBDC/","summary":"SUSE Security Update SUSE-SU-2025:0652-1 vom 2025-02-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-February/020418.html","summary":"SUSE Security Update SUSE-SU-2025:0681-1 vom 2025-02-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-February/020430.html","summary":"SUSE Security Update SUSE-SU-2025:0698-1 vom 2025-02-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-February/020417.html","summary":"SUSE Security Update SUSE-SU-2025:0667-1 vom 2025-02-24","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7288-1","summary":"Ubuntu Security Notice USN-7288-1 vom 2025-02-24","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7289-1","summary":"Ubuntu Security Notice USN-7289-1 vom 2025-02-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-February/020432.html","summary":"SUSE Security Update SUSE-SU-2025:0708-1 vom 2025-02-25","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7288-2","summary":"Ubuntu Security Notice USN-7288-2 vom 2025-02-25","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7291-1","summary":"Ubuntu Security Notice USN-7291-1 vom 2025-02-25","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7289-2","summary":"Ubuntu Security Notice USN-7289-2 vom 2025-02-25","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7293-1","summary":"Ubuntu Security Notice USN-7293-1 vom 2025-02-25","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QFXNZV75XRILYBI6G3SVSBG7OLK6OUS2/","summary":"SUSE Security Update SUSE-SU-2025:0709-1 vom 2025-02-25","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7294-1","summary":"Ubuntu Security Notice USN-7294-1 vom 2025-02-25","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7295-1","summary":"Ubuntu Security Notice USN-7295-1 vom 2025-02-25","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7289-3","summary":"Ubuntu Security Notice USN-7289-3 vom 2025-02-25","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7308-1","summary":"Ubuntu Security Notice USN-7308-1 vom 2025-02-27","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7294-2","summary":"Ubuntu Security Notice USN-7294-2 vom 2025-02-27","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7289-4","summary":"Ubuntu Security Notice USN-7289-4 vom 2025-02-27","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7294-3","summary":"Ubuntu Security Notice USN-7294-3 vom 2025-02-28","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html","summary":"Debian Security Advisory DLA-4075 vom 2025-03-01","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html","summary":"Debian Security Advisory DLA-4076 vom 2025-03-01","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7294-4","summary":"Ubuntu Security Notice USN-7294-4 vom 2025-03-03","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/6X627UISONPV7CQLLHUDVJCDEIODQO4O/","summary":"SUSE Security Update SUSE-SU-2025:0771-1 vom 2025-03-03","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:2270","summary":"Red Hat Security Advisory RHSA-2025:2270 vom 2025-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:1912","summary":"Red Hat Security Advisory RHSA-2025:1912 vom 2025-03-05","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7331-1","summary":"Ubuntu Security Notice USN-7331-1 vom 2025-03-05","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7332-1","summary":"Ubuntu Security Notice USN-7332-1 vom 2025-03-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:2490","summary":"Red Hat Security Advisory RHSA-2025:2490 vom 2025-03-10","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7344-1","summary":"Ubuntu Security Notice USN-7344-1 vom 2025-03-11","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LBO7AHILADM6B4UZWMWGQKE6YTZU2AGF/","summary":"SUSE Security Update SUSE-SU-2025:0835-1 vom 2025-03-11","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7332-2","summary":"Ubuntu Security Notice USN-7332-2 vom 2025-03-11","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7342-1","summary":"Ubuntu Security Notice USN-7342-1 vom 2025-03-11","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7332-3","summary":"Ubuntu Security Notice USN-7332-3 vom 2025-03-13","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7344-2","summary":"Ubuntu Security Notice USN-7344-2 vom 2025-03-13","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/OVTPVRIMWEEQPMDTJ24J7EW5NO7I4MQK/","summary":"SUSE Security Update SUSE-SU-2025:0855-1 vom 2025-03-13","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-096.html","summary":"Amazon Linux Security Advisory ALASKERNEL-5.4-2025-096 vom 2025-03-14","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OVTPVRIMWEEQPMDTJ24J7EW5NO7I4MQK/","summary":"SUSE Security Update SUSE-SU-2025:0855-1 vom 2025-03-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-March/020509.html","summary":"SUSE Security Update SUSE-SU-2025:0855-1 vom 2025-03-13","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-067.html","summary":"Amazon Linux Security Advisory ALASKERNEL-5.15-2025-067 vom 2025-03-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-March/020514.html","summary":"SUSE Security Update SUSE-SU-2025:0867-1 vom 2025-03-14","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:2705","summary":"Red Hat Security Advisory RHSA-2025:2705 vom 2025-03-18","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:3021","summary":"Red Hat Security Advisory RHSA-2025:3021 vom 2025-03-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-March/020560.html","summary":"SUSE Security Update SUSE-SU-2025:0945-1 vom 2025-03-19","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:2696","summary":"Red Hat Security Advisory RHSA-2025:2696 vom 2025-03-19","category":"external"},{"url":"https://security.netapp.com/advisory/ntap-20250321-0004/","summary":"NetApp Security Advisory NTAP-20250321-0004 vom 2025-03-21","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS-2025-2800.html","summary":"Amazon Linux Security Advisory ALAS-2025-2800 vom 2025-03-26","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7388-1","summary":"Ubuntu Security Notice USN-7388-1 vom 2025-03-27","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7393-1","summary":"Ubuntu Security Notice USN-7393-1 vom 2025-03-28","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7389-1","summary":"Ubuntu Security Notice USN-7389-1 vom 2025-03-28","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7229443","summary":"IBM Security Bulletin 7229443 vom 2025-03-28","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7390-1","summary":"Ubuntu Security Notice USN-7390-1 vom 2025-03-28","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7401-1","summary":"Ubuntu Security Notice USN-7401-1 vom 2025-04-01","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-087.html","summary":"Amazon Linux Security Advisory ALASKERNEL-5.10-2025-087 vom 2025-04-02","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-097.html","summary":"Amazon Linux Security Advisory ALASKERNEL-5.4-2025-097 vom 2025-04-01","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:3510","summary":"Red Hat Security Advisory RHSA-2025:3510 vom 2025-04-02","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7407-1","summary":"Ubuntu Security Notice USN-7407-1 vom 2025-04-02","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7406-1","summary":"Ubuntu Security Notice USN-7406-1 vom 2025-04-02","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7406-2","summary":"Ubuntu Security Notice USN-7406-2 vom 2025-04-02","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7406-3","summary":"Ubuntu Security Notice USN-7406-3 vom 2025-04-02","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7408-1","summary":"Ubuntu Security Notice USN-7407-1 vom 2025-04-02","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7408-2","summary":"Ubuntu Security Notice USN-7408-2 vom 2025-04-02","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7406-4","summary":"Ubuntu Security Notice USN-7406-4 vom 2025-04-03","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7413-1","summary":"Ubuntu Security Notice USN-7413-1 vom 2025-04-03","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7406-6","summary":"Ubuntu Security Notice USN-7406-6 vom 2025-04-07","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7408-3","summary":"Ubuntu Security Notice USN-7408-3 vom 2025-04-07","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7406-5","summary":"Ubuntu Security Notice USN-7406-5 vom 2025-04-07","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7421-1","summary":"Ubuntu Security Notice USN-7421-1 vom 2025-04-07","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7420-1","summary":"Ubuntu Security Notice USN-7420-1 vom 2025-04-07","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7408-4","summary":"Ubuntu Security Notice USN-7408-4 vom 2025-04-07","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html","summary":"SUSE Security Update SUSE-SU-2025:1177-1 vom 2025-04-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html","summary":"SUSE Security Update SUSE-SU-2025:1178-1 vom 2025-04-08","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/DGJ23MSZWYIA7MJ47RNVV6T27Z324VKA/","summary":"SUSE Security Update SUSE-SU-2025:1180-1 vom 2025-04-09","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7428-2","summary":"Ubuntu Security Notice USN-7428-2 vom 2025-04-09","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7428-1","summary":"Ubuntu Security Notice USN-7428-1 vom 2025-04-09","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7230557","summary":"IBM Security Bulletin 7230557 vom 2025-04-10","category":"external"},{"url":"https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-24-1R2-release?language=en_US","summary":"Juniper Security Bulletin","category":"external"},{"url":"https://lists.debian.org/debian-security-announce/2025/msg00062.html","summary":"Debian Security Advisory DSA-5900 vom 2025-04-12","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-20270.html","summary":"Oracle Linux Security Advisory ELSA-2025-20270 vom 2025-04-14","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:3935","summary":"Red Hat Security Advisory RHSA-2025:3935 vom 2025-04-16","category":"external"},{"url":"https://cloud.google.com/container-optimized-os/docs/release-notes#April_14_2025","summary":"Container-Optimized OS release notes vom 2025-04-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-April/020712.html","summary":"SUSE Security Update SUSE-SU-2025:1293-1 vom 2025-04-16","category":"external"},{"url":"https://ubuntu.com/security/notices/LSN-0111-1","summary":"Ubuntu Security Notice LSN-0111-1 vom 2025-04-16","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-088.html","summary":"Amazon Linux Security Advisory ALASKERNEL-5.10-2025-088 vom 2025-04-16","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7458-1","summary":"Ubuntu Security Notice USN-7458-1 vom 2025-04-24","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7459-1","summary":"Ubuntu Security Notice USN-7459-1 vom 2025-04-24","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7463-1","summary":"Ubuntu Security Notice USN-7463-1 vom 2025-04-24","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7461-1","summary":"Ubuntu Security Notice USN-7461-1 vom 2025-04-24","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7462-2","summary":"Ubuntu Security Notice USN-7462-2 vom 2025-04-24","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7462-1","summary":"Ubuntu Security Notice USN-7462-1 vom 2025-04-24","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7461-2","summary":"Ubuntu Security Notice USN-7461-2 vom 2025-04-24","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7459-2","summary":"Ubuntu Security Notice USN-7459-2 vom 2025-04-28","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:4342","summary":"Red Hat Security Advisory RHSA-2025:4342 vom 2025-04-30","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7461-3","summary":"Ubuntu Security Notice USN-7461-3 vom 2025-05-02","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7475-1","summary":"Ubuntu Security Notice USN-7475-1 vom 2025-05-02","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:4509","summary":"Red Hat Security Advisory RHSA-2025:4509 vom 2025-05-06","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7495-1","summary":"Ubuntu Security Notice USN-7495-1 vom 2025-05-06","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7494-3","summary":"Ubuntu Security Notice USN-7494-3 vom 2025-05-06","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7495-2","summary":"Ubuntu Security Notice USN-7495-2 vom 2025-05-06","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7494-2","summary":"Ubuntu Security Notice USN-7494-2 vom 2025-05-06","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7494-1","summary":"Ubuntu Security Notice USN-7494-1 vom 2025-05-06","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7496-1","summary":"Ubuntu Security Notice USN-7496-1 vom 2025-05-07","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7496-2","summary":"Ubuntu Security Notice USN-7496-2 vom 2025-05-07","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7494-5","summary":"Ubuntu Security Notice USN-7494-5 vom 2025-05-07","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7494-4","summary":"Ubuntu Security Notice USN-7494-4 vom 2025-05-07","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7495-3","summary":"Ubuntu Security Notice USN-7495-3 vom 2025-05-07","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7496-4","summary":"Ubuntu Security Notice USN-7496-4 vom 2025-05-07","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7496-3","summary":"Ubuntu Security Notice USN-7496-3 vom 2025-05-07","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7496-5","summary":"Ubuntu Security Notice USN-7496-5 vom 2025-05-07","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7506-3","summary":"Ubuntu Security Notice USN-7506-3 vom 2025-05-12","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7506-2","summary":"Ubuntu Security Notice USN-7506-2 vom 2025-05-12","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7506-1","summary":"Ubuntu Security Notice USN-7506-1 vom 2025-05-12","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-20320.html","summary":"Oracle Linux Security Advisory ELSA-2025-20320 vom 2025-05-12","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7506-4","summary":"Ubuntu Security Notice USN-7506-4 vom 2025-05-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:7526","summary":"Red Hat Security Advisory RHSA-2025:7526 vom 2025-05-14","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:6966","summary":"Red Hat Security Advisory RHSA-2025:6966 vom 2025-05-13","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7233232","summary":"IBM Security Bulletin 7233232 vom 2025-05-13","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-091.html","summary":"Amazon Linux Security Advisory ALASKERNEL-5.10-2025-091 vom 2025-05-14","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7511-1","summary":"Ubuntu Security Notice USN-7511-1 vom 2025-05-16","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7512-1","summary":"Ubuntu Security Notice USN-7512-1 vom 2025-05-16","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7517-1","summary":"Ubuntu Security Notice USN-7517-1 vom 2025-05-16","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7518-1","summary":"Ubuntu Security Notice USN-7518-1 vom 2025-05-20","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7511-3","summary":"Ubuntu Security Notice USN-7511-3 vom 2025-05-20","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-May/020870.html","summary":"SUSE Security Update SUSE-SU-2025:01614-1 vom 2025-05-21","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7517-2","summary":"Ubuntu Security Notice USN-7517-2 vom 2025-05-21","category":"external"},{"url":"https://lists.debian.org/debian-security-announce/2025/msg00088.html","summary":"Debian Security Advisory DSA-5925 vom 2025-05-24","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html","summary":"Debian Security Advisory DLA-4178 vom 2025-05-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-May/020902.html","summary":"SUSE Security Update SUSE-SU-2025:01707-1 vom 2025-05-26","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7517-3","summary":"Ubuntu Security Notice USN-7517-3 vom 2025-05-26","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:8248","summary":"Red Hat Security Advisory RHSA-2025:8248 vom 2025-05-28","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7539-1","summary":"Ubuntu Security Notice USN-7539-1 vom 2025-05-28","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7540-1","summary":"Ubuntu Security Notice USN-7540-1 vom 2025-05-28","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html","summary":"Debian Security Advisory DLA-4193 vom 2025-05-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-May/020964.html","summary":"SUSE Security Update SUSE-SU-2025:20344-1 vom 2025-05-29","category":"external"},{"url":"https://ubuntu.com/security/notices/LSN-0112-1","summary":"Ubuntu Security Notice LSN-0112-1 vom 2025-05-29","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-May/020965.html","summary":"SUSE Security Update SUSE-SU-2025:20343-1 vom 2025-05-29","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-072.html","summary":"Amazon Linux Security Advisory ALASKERNEL-5.15-2025-072 vom 2025-05-29","category":"external"},{"url":"https://www.dell.com/support/kbdoc/de-de/000326299/dsa-2025-213-security-update-for-dell-avamar-dell-networker-virtual-edition-nve-and-dell-powerprotect-dp-series-appliance-dell-integrated-data-protection-appliance-idpa-multiple-third-party-vulnerabilities","summary":"Dell Security Advisory DSA-2025-213 vom 2025-05-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021016.html","summary":"SUSE Security Update SUSE-SU-2025:20354-1 vom 2025-06-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021015.html","summary":"SUSE Security Update SUSE-SU-2025:20355-1 vom 2025-06-02","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021049.html","summary":"SUSE Security Update SUSE-SU-2025:20283-1 vom 2025-06-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html","summary":"SUSE Security Update SUSE-SU-2025:20248-1 vom 2025-06-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html","summary":"SUSE Security Update SUSE-SU-2025:20247-1 vom 2025-06-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html","summary":"SUSE Security Update SUSE-SU-2025:20260-1 vom 2025-06-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html","summary":"SUSE Security Update SUSE-SU-2025:20246-1 vom 2025-06-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html","summary":"SUSE Security Update SUSE-SU-2025:20249-1 vom 2025-06-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html","summary":"SUSE Security Update SUSE-SU-2025:20270-1 vom 2025-06-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html","summary":"SUSE Security Update SUSE-SU-2025:20164-1 vom 2025-06-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021137.html","summary":"SUSE Security Update SUSE-SU-2025:20206-1 vom 2025-06-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html","summary":"SUSE Security Update SUSE-SU-2025:20192-1 vom 2025-06-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html","summary":"SUSE Security Update SUSE-SU-2025:20190-1 vom 2025-06-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021174.html","summary":"SUSE Security Update SUSE-SU-2025:20165-1 vom 2025-06-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html","summary":"SUSE Security Update SUSE-SU-2025:20166-1 vom 2025-06-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html","summary":"SUSE Security Update SUSE-SU-2025:20163-1 vom 2025-06-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html","summary":"SUSE Security Update SUSE-SU-2025:20028-1 vom 2025-06-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021403.html","summary":"SUSE Security Update SUSE-SU-2025:20008-1 vom 2025-06-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html","summary":"SUSE Security Update SUSE-SU-2025:20047-1 vom 2025-06-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html","summary":"SUSE Security Update SUSE-SU-2025:20044-1 vom 2025-06-04","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-073.html","summary":"Amazon Linux Security Advisory ALASKERNEL-5.15-2025-073 vom 2025-06-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:8796","summary":"Red Hat Security Advisory RHSA-2025:8796 vom 2025-06-11","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html","summary":"SUSE Security Update SUSE-SU-2025:01919-1 vom 2025-06-12","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-20372.html","summary":"Oracle Linux Security Advisory ELSA-2025-20372 vom 2025-06-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021509.html","summary":"SUSE Security Update SUSE-SU-2025:01951-1 vom 2025-06-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html","summary":"SUSE Security Update SUSE-SU-2025:01967-1 vom 2025-06-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html","summary":"SUSE Security Update SUSE-SU-2025:01964-1 vom 2025-06-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021537.html","summary":"SUSE Security Update SUSE-SU-2025:01972-1 vom 2025-06-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021572.html","summary":"SUSE Security Update SUSE-SU-2025:01995-1 vom 2025-06-18","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:9584","summary":"Red Hat Security Advisory RHSA-2025:9584 vom 2025-06-25","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7602-1","summary":"Ubuntu Security Notice USN-7602-1 vom 2025-06-26","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7237155","summary":"IBM Security Bulletin 7237155 vom 2025-06-26","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7236419","summary":"IBM Security Bulletin 7236419 vom 2025-06-30","category":"external"},{"url":"https://documentation.solarwinds.com/en/success_center/sem/content/release_notes/sem_2025-2-1_release_notes.htm","summary":"SEM 2025.2.1 release notes vom 2025-07-02","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-20406.html","summary":"Oracle Linux Security Advisory ELSA-2025-20406 vom 2025-07-08","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:10701","summary":"Red Hat Security Advisory RHSA-2025:10701 vom 2025-07-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-July/021785.html","summary":"SUSE Security Update SUSE-SU-2025:02264-1 vom 2025-07-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-July/021811.html","summary":"SUSE Security Update SUSE-SU-2025:02321-1 vom 2025-07-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-July/021810.html","summary":"SUSE Security Update SUSE-SU-2025:02322-1 vom 2025-07-15","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-20470.html","summary":"Oracle Linux Security Advisory ELSA-2025-20470 vom 2025-07-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-July/021829.html","summary":"SUSE Security Update SUSE-SU-2025:02334-1 vom 2025-07-16","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7640-1","summary":"Ubuntu Security Notice USN-7640-1 vom 2025-07-16","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7654-1","summary":"Ubuntu Security Notice USN-7654-1 vom 2025-07-18","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7654-2","summary":"Ubuntu Security Notice USN-7654-2 vom 2025-07-18","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7654-3","summary":"Ubuntu Security Notice USN-7654-3 vom 2025-07-18","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7655-1","summary":"Ubuntu Security Notice USN-7655-1 vom 2025-07-18","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7654-4","summary":"Ubuntu Security Notice USN-7654-4 vom 2025-07-22","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-July/021978.html","summary":"SUSE Security Update SUSE-SU-2025:02537-1 vom 2025-07-28","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7654-5","summary":"Ubuntu Security Notice USN-7654-5 vom 2025-07-29","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7686-1","summary":"Ubuntu Security Notice USN-7686-1 vom 2025-08-05","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html","summary":"Debian Security Advisory DLA-4271 vom 2025-08-13","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7711-1","summary":"Ubuntu Security Notice USN-7711-1 vom 2025-08-22","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7712-1","summary":"Ubuntu Security Notice USN-7712-1 vom 2025-08-22","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7726-1","summary":"Ubuntu Security Notice USN-7726-1 vom 2025-08-29","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7726-2","summary":"Ubuntu Security Notice USN-7726-2 vom 2025-08-29","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7726-3","summary":"Ubuntu Security Notice USN-7726-3 vom 2025-08-29","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:15016","summary":"Red Hat Security Advisory RHSA-2025:15016 vom 2025-09-02","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7712-2","summary":"Ubuntu Security Notice USN-7712-2 vom 2025-09-02","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7726-4","summary":"Ubuntu Security Notice USN-7726-4 vom 2025-09-02","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-20553.html","summary":"Oracle Linux Security Advisory ELSA-2025-20553 vom 2025-09-10","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7726-5","summary":"Ubuntu Security Notice USN-7726-5 vom 2025-09-18","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7776-1","summary":"Ubuntu Security Notice USN-7776-1 vom 2025-09-25","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7796-1","summary":"Ubuntu Security Notice USN-7796-1 vom 2025-10-02","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7797-1","summary":"Ubuntu Security Notice USN-7797-1 vom 2025-10-02","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7796-3","summary":"Ubuntu Security Notice USN-7796-3 vom 2025-10-02","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7796-2","summary":"Ubuntu Security Notice USN-7795-2 vom 2025-10-02","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7797-2","summary":"Ubuntu Security Notice USN-7797-2 vom 2025-10-02","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7246320","summary":"IBM Security Bulletin 7246320 vom 2025-10-06","category":"external"},{"url":"https://ubuntu.com/security/notices/LSN-0115-1","summary":"Ubuntu Security Notice LSN-0115-1 vom 2025-10-08","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7796-4","summary":"Ubuntu Security Notice USN-7796-4 vom 2025-10-13","category":"external"},{"url":"https://www.dell.com/support/kbdoc/000385435","summary":"Dell Security Advisory DSA-2025-404 vom 2025-10-31","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-19447.html","summary":"Oracle Linux Security Advisory ELSA-2025-19447 vom 2025-11-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html","summary":"SUSE Security Update SUSE-SU-2025:2264-1 vom 2025-11-11","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2025-25757.html","summary":"Oracle Linux Security Advisory ELSA-2025-25757 vom 2025-11-12","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7874-2","summary":"Ubuntu Security Notice USN-7874-2 vom 2025-11-19","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7874-1","summary":"Ubuntu Security Notice USN-7874-1 vom 2025-11-19","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7875-1","summary":"Ubuntu Security Notice USN-7875-1 vom 2025-11-19","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:22095","summary":"Red Hat Security Advisory RHSA-2025:22095 vom 2025-11-25","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2025:22124","summary":"Red Hat Security Advisory RHSA-2025:22124 vom 2025-11-25","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7874-3","summary":"Ubuntu Security Notice USN-7874-3 vom 2025-12-04","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7939-1","summary":"Ubuntu Security Notice USN-7939-1 vom 2025-12-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7939-2","summary":"Ubuntu Security Notice USN-7939-2 vom 2025-12-17","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7256201","summary":"IBM Security Bulletin 7256201 vom 2026-01-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:0173","summary":"Red Hat Security Advisory RHSA-2026:0173 vom 2026-01-07","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:0537","summary":"Red Hat Security Advisory RHSA-2026:0537 vom 2026-01-14","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2026:0576","summary":"Red Hat Security Advisory RHSA-2026:0576 vom 2026-01-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html","summary":"SUSE Security Update SUSE-SU-2026:0149-1 vom 2026-01-19","category":"external"},{"url":"https://lists.debian.org/debian-security-announce/2026/msg00036.html","summary":"Debian Security Advisory DSA-6127 vom 2026-02-10","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2026/02/msg00017.html","summary":"Debian Security Advisory DLA-4476 vom 2026-02-11","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024176.html","summary":"SUSE Security Update SUSE-SU-2026:20319-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html","summary":"SUSE Security Update SUSE-SU-2026:20325-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html","summary":"SUSE Security Update SUSE-SU-2026:20324-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html","summary":"SUSE Security Update SUSE-SU-2026:20283-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html","summary":"SUSE Security Update SUSE-SU-2026:20291-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024168.html","summary":"SUSE Security Update SUSE-SU-2026:20327-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024169.html","summary":"SUSE Security Update SUSE-SU-2026:20326-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html","summary":"SUSE Security Update SUSE-SU-2026:20294-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html","summary":"SUSE Security Update SUSE-SU-2026:20320-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024190.html","summary":"SUSE Security Update SUSE-SU-2026:20300-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html","summary":"SUSE Security Update SUSE-SU-2026:20292-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html","summary":"SUSE Security Update SUSE-SU-2026:20323-1 vom 2026-02-13","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2026-6037.html","summary":"Oracle Linux Security Advisory ELSA-2026-6037 vom 2026-04-01","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://lore.kernel.org/linux-cve-announce/2024051758-CVE-2023-52657-628c@gregkh/T/","published":"2024-05-20","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://lore.kernel.org/linux-cve-announce/2024051758-CVE-2023-52657-628c@gregkh/T/","added":"2026-03-31T00:00:00.000Z","public_url":"https://lore.kernel.org/linux-cve-announce/2024051758-CVE-2023-52657-628c@gregkh/T/","public_source":"BSI","public_source_slug":"bsi","vendor_slug":null,"severity_norm":"medium","search_text":"bsi:wid-sec-w-2024-1188 cve-2023-52657 linux kernel: mehrere schwachstellen ermöglichen denial of service bsi bsi","public_published":"2024-05-20","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31"},{"id":"CVE-2016-9535","cve":"CVE-2016-9535","title":"MITRE CVE-2016-9535: LibTIFF Heap Buffer Overflow Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2016-9535","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2016-9535","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2016-9535","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2016-9535","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2016-9535","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2016-9535 cve-2016-9535 mitre cve-2016-9535: libtiff heap buffer overflow vulnerability microsoft msrc msrc"},{"id":"CVE-2022-49764","cve":"CVE-2022-49764","title":"bpf: Prevent bpf program recursion for raw tracepoint probes","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49764","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49764","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49764","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49764","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49764","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2022-49764 cve-2022-49764 bpf: prevent bpf program recursion for raw tracepoint probes microsoft msrc msrc"},{"id":"CVE-2022-49766","cve":"CVE-2022-49766","title":"netlink: Bounds-check struct nlmsgerr creation","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49766","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49766","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49766","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49766","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49766","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2022-49766 cve-2022-49766 netlink: bounds-check struct nlmsgerr creation microsoft msrc msrc"},{"id":"CVE-2022-49803","cve":"CVE-2022-49803","title":"netdevsim: Fix memory leak of nsim_dev-&gt;fa_cookie","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49803","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49803","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49803","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49803","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49803","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2022-49803 cve-2022-49803 netdevsim: fix memory leak of nsim_dev-&gt;fa_cookie microsoft msrc msrc"},{"id":"CVE-2022-49810","cve":"CVE-2022-49810","title":"netfs: Fix missing xas_retry() calls in xarray iteration","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49810","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49810","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49810","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49810","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49810","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2022-49810 cve-2022-49810 netfs: fix missing xas_retry() calls in xarray iteration microsoft msrc msrc"},{"id":"CVE-2022-49829","cve":"CVE-2022-49829","title":"drm/scheduler: fix fence ref counting","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49829","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49829","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49829","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49829","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49829","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2022-49829 cve-2022-49829 drm/scheduler: fix fence ref counting microsoft msrc msrc"},{"id":"CVE-2022-49833","cve":"CVE-2022-49833","title":"btrfs: zoned: clone zoned device info when cloning a device","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49833","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49833","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49833","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49833","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49833","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2022-49833 cve-2022-49833 btrfs: zoned: clone zoned device info when cloning a device microsoft msrc msrc"},{"id":"CVE-2022-49858","cve":"CVE-2022-49858","title":"octeontx2-pf: Fix SQE threshold checking","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49858","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49858","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49858","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49858","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49858","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2022-49858 cve-2022-49858 octeontx2-pf: fix sqe threshold checking microsoft msrc msrc"},{"id":"CVE-2022-49901","cve":"CVE-2022-49901","title":"blk-mq: Fix kmemleak in blk_mq_init_allocated_queue","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49901","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49901","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49901","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49901","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49901","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2022-49901 cve-2022-49901 blk-mq: fix kmemleak in blk_mq_init_allocated_queue microsoft msrc msrc"},{"id":"CVE-2022-49932","cve":"CVE-2022-49932","title":"KVM: VMX: Do _all_ initialization before exposing /dev/kvm to userspace","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49932","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49932","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49932","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49932","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49932","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2022-49932 cve-2022-49932 kvm: vmx: do _all_ initialization before exposing /dev/kvm to userspace microsoft msrc msrc"},{"id":"CVE-2022-49935","cve":"CVE-2022-49935","title":"dma-buf/dma-resv: check if the new fence is really later","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49935","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49935","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49935","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49935","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49935","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2022-49935 cve-2022-49935 dma-buf/dma-resv: check if the new fence is really later microsoft msrc msrc"},{"id":"CVE-2022-49955","cve":"CVE-2022-49955","title":"powerpc/rtas: Fix RTAS MSR[HV] handling for Cell","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49955","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49955","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49955","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49955","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49955","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2022-49955 cve-2022-49955 powerpc/rtas: fix rtas msr[hv] handling for cell microsoft msrc msrc"},{"id":"CVE-2022-49961","cve":"CVE-2022-49961","title":"bpf: Do mark_chain_precision for ARG_CONST_ALLOC_SIZE_OR_ZERO","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49961","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49961","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49961","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49961","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49961","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2022-49961 cve-2022-49961 bpf: do mark_chain_precision for arg_const_alloc_size_or_zero microsoft msrc msrc"},{"id":"CVE-2022-49967","cve":"CVE-2022-49967","title":"bpf: Fix a data-race around bpf_jit_limit.","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49967","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49967","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49967","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.7,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49967","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49967","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2022-49967 cve-2022-49967 bpf: fix a data-race around bpf_jit_limit. microsoft msrc msrc"},{"id":"CVE-2022-49980","cve":"CVE-2022-49980","title":"USB: gadget: Fix use-after-free Read in usb_udc_uevent()","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49980","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49980","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49980","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49980","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49980","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2022-49980 cve-2022-49980 usb: gadget: fix use-after-free read in usb_udc_uevent() microsoft msrc msrc"},{"id":"CVE-2022-49997","cve":"CVE-2022-49997","title":"net: lantiq_xrx200: restore buffer if memory allocation failed","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49997","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49997","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49997","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49997","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49997","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2022-49997 cve-2022-49997 net: lantiq_xrx200: restore buffer if memory allocation failed microsoft msrc msrc"},{"id":"CVE-2022-50002","cve":"CVE-2022-50002","title":"net/mlx5: LAG, fix logic over MLX5_LAG_FLAG_NDEVS_READY","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50002","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50002","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50002","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50002","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50002","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2022-50002 cve-2022-50002 net/mlx5: lag, fix logic over mlx5_lag_flag_ndevs_ready microsoft msrc msrc"},{"id":"CVE-2022-50009","cve":"CVE-2022-50009","title":"f2fs: fix null-ptr-deref in f2fs_get_dnode_of_data","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50009","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50009","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50009","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50009","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50009","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2022-50009 cve-2022-50009 f2fs: fix null-ptr-deref in f2fs_get_dnode_of_data microsoft msrc msrc"},{"id":"CVE-2022-50015","cve":"CVE-2022-50015","title":"ASoC: SOF: Intel: hda-ipc: Do not process IPC reply before firmware boot","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50015","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50015","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50015","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.6,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50015","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50015","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2022-50015 cve-2022-50015 asoc: sof: intel: hda-ipc: do not process ipc reply before firmware boot microsoft msrc msrc"},{"id":"CVE-2022-50016","cve":"CVE-2022-50016","title":"ASoC: SOF: Intel: cnl: Do not process IPC reply before firmware boot","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50016","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50016","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50016","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50016","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50016","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2022-50016 cve-2022-50016 asoc: sof: intel: cnl: do not process ipc reply before firmware boot microsoft msrc msrc"},{"id":"CVE-2022-50070","cve":"CVE-2022-50070","title":"mptcp: do not queue data on closed subflows","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50070","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50070","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50070","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50070","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50070","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2022-50070 cve-2022-50070 mptcp: do not queue data on closed subflows microsoft msrc msrc"},{"id":"CVE-2022-50071","cve":"CVE-2022-50071","title":"mptcp: move subflow cleanup in mptcp_destroy_common()","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50071","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50071","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50071","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50071","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50071","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2022-50071 cve-2022-50071 mptcp: move subflow cleanup in mptcp_destroy_common() microsoft msrc msrc"},{"id":"CVE-2022-50073","cve":"CVE-2022-50073","title":"net: tap: NULL pointer derefence in dev_parse_header_protocol when skb-&gt;dev is null","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50073","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50073","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50073","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50073","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50073","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2022-50073 cve-2022-50073 net: tap: null pointer derefence in dev_parse_header_protocol when skb-&gt;dev is null microsoft msrc msrc"},{"id":"CVE-2022-50116","cve":"CVE-2022-50116","title":"tty: n_gsm: fix deadlock and link starvation in outgoing data path","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50116","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50116","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50116","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50116","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50116","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2022-50116 cve-2022-50116 tty: n_gsm: fix deadlock and link starvation in outgoing data path microsoft msrc msrc"},{"id":"CVE-2022-50163","cve":"CVE-2022-50163","title":"ax25: fix incorrect dev_tracker usage","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50163","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50163","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50163","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50163","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50163","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2022-50163 cve-2022-50163 ax25: fix incorrect dev_tracker usage microsoft msrc msrc"},{"id":"CVE-2022-50166","cve":"CVE-2022-50166","title":"Bluetooth: When HCI work queue is drained, only queue chained work","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50166","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50166","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50166","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50166","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50166","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2022-50166 cve-2022-50166 bluetooth: when hci work queue is drained, only queue chained work microsoft msrc msrc"},{"id":"CVE-2022-50167","cve":"CVE-2022-50167","title":"bpf: fix potential 32-bit overflow when accessing ARRAY map element","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50167","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50167","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50167","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50167","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50167","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2022-50167 cve-2022-50167 bpf: fix potential 32-bit overflow when accessing array map element microsoft msrc msrc"},{"id":"CVE-2022-50195","cve":"CVE-2022-50195","title":"ARM: dts: qcom: replace gcc PXO with pxo_board fixed clock","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50195","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50195","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50195","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50195","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50195","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2022-50195 cve-2022-50195 arm: dts: qcom: replace gcc pxo with pxo_board fixed clock microsoft msrc msrc"},{"id":"CVE-2022-50224","cve":"CVE-2022-50224","title":"KVM: x86/mmu: Treat NX as a valid SPTE bit for NPT","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50224","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50224","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50224","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50224","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50224","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2022-50224 cve-2022-50224 kvm: x86/mmu: treat nx as a valid spte bit for npt microsoft msrc msrc"},{"id":"CVE-2022-50230","cve":"CVE-2022-50230","title":"arm64: set UXN on swapper page tables","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50230","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50230","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50230","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.1,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50230","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50230","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2022-50230 cve-2022-50230 arm64: set uxn on swapper page tables microsoft msrc msrc"},{"id":"CVE-2022-50232","cve":"CVE-2022-50232","title":"arm64: set UXN on swapper page tables","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50232","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50232","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50232","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.1,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50232","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50232","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2022-50232 cve-2022-50232 arm64: set uxn on swapper page tables microsoft msrc msrc"},{"id":"CVE-2022-50461","cve":"CVE-2022-50461","title":"net: ethernet: ti: am65-cpsw: Fix PM runtime leakage in am65_cpsw_nuss_ndo_slave_open()","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50461","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50461","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50461","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50461","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50461","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2022-50461 cve-2022-50461 net: ethernet: ti: am65-cpsw: fix pm runtime leakage in am65_cpsw_nuss_ndo_slave_open() microsoft msrc msrc"},{"id":"CVE-2022-50467","cve":"CVE-2022-50467","title":"scsi: lpfc: Fix null ndlp ptr dereference in abnormal exit path for GFT_ID","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50467","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50467","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50467","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50467","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50467","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2022-50467 cve-2022-50467 scsi: lpfc: fix null ndlp ptr dereference in abnormal exit path for gft_id microsoft msrc msrc"},{"id":"CVE-2023-53037","cve":"CVE-2023-53037","title":"scsi: mpi3mr: Bad drive in topology results kernel crash","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53037","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53037","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53037","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.1,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53037","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53037","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2023-53037 cve-2023-53037 scsi: mpi3mr: bad drive in topology results kernel crash microsoft msrc msrc"},{"id":"CVE-2023-53042","cve":"CVE-2023-53042","title":"drm/amd/display: Do not set DRR on pipe Commit","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53042","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53042","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53042","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53042","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53042","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2023-53042 cve-2023-53042 drm/amd/display: do not set drr on pipe commit microsoft msrc msrc"},{"id":"CVE-2023-53064","cve":"CVE-2023-53064","title":"iavf: fix hang on reboot with ice","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53064","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53064","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53064","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53064","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53064","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2023-53064 cve-2023-53064 iavf: fix hang on reboot with ice microsoft msrc msrc"},{"id":"CVE-2023-53068","cve":"CVE-2023-53068","title":"net: usb: lan78xx: Limit packet length to skb-&gt;len","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53068","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53068","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53068","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53068","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53068","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2023-53068 cve-2023-53068 net: usb: lan78xx: limit packet length to skb-&gt;len microsoft msrc msrc"},{"id":"CVE-2023-53072","cve":"CVE-2023-53072","title":"mptcp: use the workqueue to destroy unaccepted sockets","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53072","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53072","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53072","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53072","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53072","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2023-53072 cve-2023-53072 mptcp: use the workqueue to destroy unaccepted sockets microsoft msrc msrc"},{"id":"CVE-2023-53074","cve":"CVE-2023-53074","title":"drm/amdgpu: fix ttm_bo calltrace warning in psp_hw_fini","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53074","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53074","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53074","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53074","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53074","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2023-53074 cve-2023-53074 drm/amdgpu: fix ttm_bo calltrace warning in psp_hw_fini microsoft msrc msrc"},{"id":"CVE-2023-53093","cve":"CVE-2023-53093","title":"tracing: Do not let histogram values have some modifiers","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53093","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53093","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53093","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53093","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53093","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2023-53093 cve-2023-53093 tracing: do not let histogram values have some modifiers microsoft msrc msrc"},{"id":"CVE-2023-53105","cve":"CVE-2023-53105","title":"net/mlx5e: Fix cleanup null-ptr deref on encap lock","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53105","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53105","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53105","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53105","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53105","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2023-53105 cve-2023-53105 net/mlx5e: fix cleanup null-ptr deref on encap lock microsoft msrc msrc"},{"id":"CVE-2023-53154","cve":"CVE-2023-53154","title":"parse_string in cJSON before 1.7.18 has a heap-based buffer over-read via {\"1\":1, with no trailing newline if cJSON_ParseWithLength is called.","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53154","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53154","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53154","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":2.9,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53154","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53154","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2023-53154 cve-2023-53154 parse_string in cjson before 1.7.18 has a heap-based buffer over-read via {\"1\":1, with no trailing newline if cjson_parsewithlength is called. microsoft msrc msrc"},{"id":"CVE-2023-53460","cve":"CVE-2023-53460","title":"wifi: rtw88: fix memory leak in rtw_usb_probe()","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53460","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53460","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53460","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53460","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53460","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2023-53460 cve-2023-53460 wifi: rtw88: fix memory leak in rtw_usb_probe() microsoft msrc msrc"},{"id":"CVE-2023-53466","cve":"CVE-2023-53466","title":"wifi: mt76: mt7915: fix memory leak in mt7915_mcu_exit","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53466","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53466","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53466","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53466","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53466","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2023-53466 cve-2023-53466 wifi: mt76: mt7915: fix memory leak in mt7915_mcu_exit microsoft msrc msrc"},{"id":"CVE-2023-53543","cve":"CVE-2023-53543","title":"vdpa: Add max vqp attr to vdpa_nl_policy for nlattr length check","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53543","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53543","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53543","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53543","added":"2026-03-11T22:19:02.813Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53543","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2023-53543 cve-2023-53543 vdpa: add max vqp attr to vdpa_nl_policy for nlattr length check microsoft msrc msrc"},{"id":"CVE-2024-11584","cve":"CVE-2024-11584","title":"cloud-init through 25.1.2 includes the systemd socket unit cloud-init-hotplugd.socket with default SocketMode that grants 0666 permissions, making it world-writable. This is used f","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-11584","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-11584","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-11584","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.9,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-11584","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-11584","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-11584 cve-2024-11584 cloud-init through 25.1.2 includes the systemd socket unit cloud-init-hotplugd.socket with default socketmode that grants 0666 permissions, making it world-writable. this is used f microsoft msrc msrc"},{"id":"CVE-2024-12718","cve":"CVE-2024-12718","title":"Bypass extraction filter to modify file metadata outside extraction directory","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-12718","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-12718","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-12718","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.3,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-12718","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-12718","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-12718 cve-2024-12718 bypass extraction filter to modify file metadata outside extraction directory microsoft msrc msrc"},{"id":"CVE-2024-22653","cve":"CVE-2024-22653","title":"yasm commit 9defefae was discovered to contain a NULL pointer dereference via the yasm_section_bcs_append function at section.c.","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-22653","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-22653","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-22653","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-22653","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-22653","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-22653 cve-2024-22653 yasm commit 9defefae was discovered to contain a null pointer dereference via the yasm_section_bcs_append function at section.c. microsoft msrc msrc"},{"id":"CVE-2024-23337","cve":"CVE-2024-23337","title":"jq has signed integer overflow in jv.c:jvp_array_write","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-23337","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-23337","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-23337","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.3,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-23337","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-23337","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-23337 cve-2024-23337 jq has signed integer overflow in jv.c:jvp_array_write microsoft msrc msrc"},{"id":"CVE-2024-47081","cve":"CVE-2024-47081","title":"Requests vulnerable to .netrc credentials leak via malicious URLs","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-47081","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-47081","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-47081","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.3,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-47081","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-47081","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-47081 cve-2024-47081 requests vulnerable to .netrc credentials leak via malicious urls microsoft msrc msrc"},{"id":"CVE-2024-47619","cve":"CVE-2024-47619","title":"tranport: TLS host name wildcard matching too lax","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-47619","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-47619","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-47619","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-47619","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-47619","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-47619 cve-2024-47619 tranport: tls host name wildcard matching too lax microsoft msrc msrc"},{"id":"CVE-2024-58098","cve":"CVE-2024-58098","title":"bpf: track changes_pkt_data property for global functions","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-58098","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-58098","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-58098","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-58098","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-58098","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-58098 cve-2024-58098 bpf: track changes_pkt_data property for global functions microsoft msrc msrc"},{"id":"CVE-2024-58100","cve":"CVE-2024-58100","title":"bpf: check changes_pkt_data property for extension programs","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-58100","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-58100","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-58100","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-58100","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-58100","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-58100 cve-2024-58100 bpf: check changes_pkt_data property for extension programs microsoft msrc msrc"},{"id":"CVE-2024-58237","cve":"CVE-2024-58237","title":"bpf: consider that tail calls invalidate packet pointers","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-58237","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-58237","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-58237","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-58237","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-58237","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2024-58237 cve-2024-58237 bpf: consider that tail calls invalidate packet pointers microsoft msrc msrc"},{"id":"CVE-2024-6174","cve":"CVE-2024-6174","title":"When a non-x86 platform is detected, cloud-init grants root access to a hardcoded url with a local IP address. To prevent this, cloud-init default configurations disable platform e","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6174","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6174","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6174","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6174","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6174","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2024-6174 cve-2024-6174 when a non-x86 platform is detected, cloud-init grants root access to a hardcoded url with a local ip address. to prevent this, cloud-init default configurations disable platform e microsoft msrc msrc"},{"id":"CVE-2025-0033","cve":"CVE-2025-0033","title":"AMD CVE-2025-0033: RMP Corruption During SNP Initialization","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-0033","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-0033","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-0033","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.2,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-0033","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-0033","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-0033 cve-2025-0033 amd cve-2025-0033: rmp corruption during snp initialization microsoft msrc msrc"},{"id":"CVE-2025-0913","cve":"CVE-2025-0913","title":"Inconsistent handling of O_CREATE|O_EXCL on Unix and Windows in os in syscall","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-0913","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-0913","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-0913","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-0913","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-0913","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-0913 cve-2025-0913 inconsistent handling of o_create|o_excl on unix and windows in os in syscall microsoft msrc msrc"},{"id":"CVE-2025-11731","cve":"CVE-2025-11731","title":"Libxslt: type confusion in exsltfuncresultcompfunction of libxslt","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11731","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11731","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11731","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":3.1,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11731","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11731","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-11731 cve-2025-11731 libxslt: type confusion in exsltfuncresultcompfunction of libxslt microsoft msrc msrc"},{"id":"CVE-2025-11840","cve":"CVE-2025-11840","title":"GNU Binutils ldmisc.c vfinfo out-of-bounds","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11840","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11840","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11840","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":3.3,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11840","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11840","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-11840 cve-2025-11840 gnu binutils ldmisc.c vfinfo out-of-bounds microsoft msrc msrc"},{"id":"CVE-2025-20260","cve":"CVE-2025-20260","title":"ClamAV PDF Scanning Buffer Overflow Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-20260","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-20260","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-20260","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.8,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-20260","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-20260","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2025-20260 cve-2025-20260 clamav pdf scanning buffer overflow vulnerability microsoft msrc msrc"},{"id":"CVE-2025-21264","cve":"CVE-2025-21264","title":"Visual Studio Code Security Feature Bypass Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21264","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21264","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21264","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21264","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21264","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-21264 cve-2025-21264 visual studio code security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2025-22247","cve":"CVE-2025-22247","title":"Insecure file handling vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-22247","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-22247","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-22247","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.1,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-22247","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-22247","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-22247 cve-2025-22247 insecure file handling vulnerability microsoft msrc msrc"},{"id":"CVE-2025-22874","cve":"CVE-2025-22874","title":"Usage of ExtKeyUsageAny disables policy validation in crypto/x509","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-22874","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-22874","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-22874","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-22874","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-22874","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-22874 cve-2025-22874 usage of extkeyusageany disables policy validation in crypto/x509 microsoft msrc msrc"},{"id":"CVE-2025-23140","cve":"CVE-2025-23140","title":"misc: pci_endpoint_test: Avoid issue of interrupts remaining after request_irq error","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23140","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23140","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23140","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23140","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23140","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-23140 cve-2025-23140 misc: pci_endpoint_test: avoid issue of interrupts remaining after request_irq error microsoft msrc msrc"},{"id":"CVE-2025-23141","cve":"CVE-2025-23141","title":"KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23141","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23141","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23141","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23141","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23141","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-23141 cve-2025-23141 kvm: x86: acquire srcu in kvm_get_mp_state to protect guest memory accesses microsoft msrc msrc"},{"id":"CVE-2025-23142","cve":"CVE-2025-23142","title":"sctp: detect and prevent references to a freed transport in sendmsg","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23142","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23142","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23142","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23142","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23142","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-23142 cve-2025-23142 sctp: detect and prevent references to a freed transport in sendmsg microsoft msrc msrc"},{"id":"CVE-2025-23143","cve":"CVE-2025-23143","title":"net: Fix null-ptr-deref by sock_lock_init_class_and_name() and rmmod.","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23143","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23143","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23143","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23143","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23143","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-23143 cve-2025-23143 net: fix null-ptr-deref by sock_lock_init_class_and_name() and rmmod. microsoft msrc msrc"},{"id":"CVE-2025-23144","cve":"CVE-2025-23144","title":"backlight: led_bl: Hold led_access lock when calling led_sysfs_disable()","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23144","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23144","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23144","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23144","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23144","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-23144 cve-2025-23144 backlight: led_bl: hold led_access lock when calling led_sysfs_disable() microsoft msrc msrc"},{"id":"CVE-2025-23145","cve":"CVE-2025-23145","title":"mptcp: fix NULL pointer in can_accept_new_subflow","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23145","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23145","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23145","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23145","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23145","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-23145 cve-2025-23145 mptcp: fix null pointer in can_accept_new_subflow microsoft msrc msrc"},{"id":"CVE-2025-23146","cve":"CVE-2025-23146","title":"mfd: ene-kb3930: Fix a potential NULL pointer dereference","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23146","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23146","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23146","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23146","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23146","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-23146 cve-2025-23146 mfd: ene-kb3930: fix a potential null pointer dereference microsoft msrc msrc"},{"id":"CVE-2025-23147","cve":"CVE-2025-23147","title":"i3c: Add NULL pointer check in i3c_master_queue_ibi()","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23147","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23147","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23147","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23147","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23147","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-23147 cve-2025-23147 i3c: add null pointer check in i3c_master_queue_ibi() microsoft msrc msrc"},{"id":"CVE-2025-23148","cve":"CVE-2025-23148","title":"soc: samsung: exynos-chipid: Add NULL pointer check in exynos_chipid_probe()","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23148","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23148","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23148","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23148","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23148","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-23148 cve-2025-23148 soc: samsung: exynos-chipid: add null pointer check in exynos_chipid_probe() microsoft msrc msrc"},{"id":"CVE-2025-23150","cve":"CVE-2025-23150","title":"ext4: fix off-by-one error in do_split","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23150","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23150","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23150","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23150","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23150","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-23150 cve-2025-23150 ext4: fix off-by-one error in do_split microsoft msrc msrc"},{"id":"CVE-2025-23155","cve":"CVE-2025-23155","title":"net: stmmac: Fix accessing freed irq affinity_hint","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23155","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23155","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23155","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23155","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23155","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-23155 cve-2025-23155 net: stmmac: fix accessing freed irq affinity_hint microsoft msrc msrc"},{"id":"CVE-2025-23156","cve":"CVE-2025-23156","title":"media: venus: hfi_parser: refactor hfi packet parsing logic","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23156","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23156","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23156","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23156","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23156","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-23156 cve-2025-23156 media: venus: hfi_parser: refactor hfi packet parsing logic microsoft msrc msrc"},{"id":"CVE-2025-23157","cve":"CVE-2025-23157","title":"media: venus: hfi_parser: add check to avoid out of bound access","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23157","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23157","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23157","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23157","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23157","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-23157 cve-2025-23157 media: venus: hfi_parser: add check to avoid out of bound access microsoft msrc msrc"},{"id":"CVE-2025-23158","cve":"CVE-2025-23158","title":"media: venus: hfi: add check to handle incorrect queue size","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23158","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23158","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23158","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23158","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23158","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-23158 cve-2025-23158 media: venus: hfi: add check to handle incorrect queue size microsoft msrc msrc"},{"id":"CVE-2025-23159","cve":"CVE-2025-23159","title":"media: venus: hfi: add a check to handle OOB in sfr region","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23159","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23159","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23159","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23159","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23159","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-23159 cve-2025-23159 media: venus: hfi: add a check to handle oob in sfr region microsoft msrc msrc"},{"id":"CVE-2025-23161","cve":"CVE-2025-23161","title":"PCI: vmd: Make vmd_dev::cfg_lock a raw_spinlock_t type","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23161","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23161","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23161","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":3.3,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23161","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23161","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-23161 cve-2025-23161 pci: vmd: make vmd_dev::cfg_lock a raw_spinlock_t type microsoft msrc msrc"},{"id":"CVE-2025-23163","cve":"CVE-2025-23163","title":"net: vlan: don't propagate flags on open","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23163","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23163","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23163","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23163","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23163","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-23163 cve-2025-23163 net: vlan: don't propagate flags on open microsoft msrc msrc"},{"id":"CVE-2025-23167","cve":"CVE-2025-23167","title":"&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23167","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23167","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23167","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23167","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-23167","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-23167 cve-2025-23167 &lt;p&gt;&lt;strong&gt;is azure linux the only microsoft product that includes this open-source library and is therefore microsoft msrc msrc"},{"id":"CVE-2025-24052","cve":"CVE-2025-24052","title":"Windows Agere Modem Driver Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24052","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24052","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24052","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24052","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24052","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-24052 cve-2025-24052 windows agere modem driver elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-24063","cve":"CVE-2025-24063","title":"Kernel Streaming Service Driver Elevation of Privilege Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24063","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24063","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24063","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24063","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24063","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-24063 cve-2025-24063 kernel streaming service driver elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-24065","cve":"CVE-2025-24065","title":"Windows Storage Management Provider Information Disclosure Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24065","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24065","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24065","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24065","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24065","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-24065 cve-2025-24065 windows storage management provider information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-24068","cve":"CVE-2025-24068","title":"Windows Storage Management Provider Information Disclosure Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24068","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24068","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24068","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24068","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24068","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-24068 cve-2025-24068 windows storage management provider information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-24069","cve":"CVE-2025-24069","title":"Windows Storage Management Provider Information Disclosure Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24069","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24069","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24069","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24069","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24069","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-24069 cve-2025-24069 windows storage management provider information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-24990","cve":"CVE-2025-24990","title":"Windows Agere Modem Driver Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24990","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24990","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24990","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24990","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24990","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-24990 cve-2025-24990 windows agere modem driver elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-25004","cve":"CVE-2025-25004","title":"PowerShell Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-25004","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-25004","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-25004","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.3,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-25004","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-25004","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-25004 cve-2025-25004 powershell elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-26646","cve":"CVE-2025-26646","title":".NET, Visual Studio, and Build Tools for Visual Studio Spoofing Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26646","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26646","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26646","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26646","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26646","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-26646 cve-2025-26646 .net, visual studio, and build tools for visual studio spoofing vulnerability microsoft msrc msrc"},{"id":"CVE-2025-26677","cve":"CVE-2025-26677","title":"Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26677","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26677","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26677","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26677","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26677","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-26677 cve-2025-26677 windows remote desktop gateway (rd gateway) denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2025-26684","cve":"CVE-2025-26684","title":"Microsoft Defender Elevation of Privilege Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26684","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26684","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26684","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.7,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26684","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26684","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-26684 cve-2025-26684 microsoft defender elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-26685","cve":"CVE-2025-26685","title":"Microsoft Defender for Identity Spoofing Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26685","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26685","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26685","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26685","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26685","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-26685 cve-2025-26685 microsoft defender for identity spoofing vulnerability microsoft msrc msrc"},{"id":"CVE-2025-27151","cve":"CVE-2025-27151","title":"redis-check-aof may lead to stack overflow and potential RCE","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27151","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27151","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27151","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.7,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27151","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27151","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-27151 cve-2025-27151 redis-check-aof may lead to stack overflow and potential rce microsoft msrc msrc"},{"id":"CVE-2025-27468","cve":"CVE-2025-27468","title":"Windows Kernel-Mode Driver Elevation of Privilege Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27468","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27468","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27468","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27468","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27468","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-27468 cve-2025-27468 windows kernel-mode driver elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-27488","cve":"CVE-2025-27488","title":"Microsoft Windows Hardware Lab Kit (HLK) Elevation of Privilege Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27488","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27488","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27488","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.7,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27488","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27488","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-27488 cve-2025-27488 microsoft windows hardware lab kit (hlk) elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-2884","cve":"CVE-2025-2884","title":"Cert CC: CVE-2025-2884 Out-of-Bounds read vulnerability in TCG TPM2.0 reference implementation","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-2884","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-2884","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-2884","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.3,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-2884","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-2884","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-2884 cve-2025-2884 cert cc: cve-2025-2884 out-of-bounds read vulnerability in tcg tpm2.0 reference implementation microsoft msrc msrc"},{"id":"CVE-2025-29813","cve":"CVE-2025-29813","title":"Azure DevOps Elevation of Privilege Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29813","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29813","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29813","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":10,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29813","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29813","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2025-29813 cve-2025-29813 azure devops elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-29825","cve":"CVE-2025-29825","title":"Microsoft Edge (Chromium-based) Spoofing Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29825","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29825","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29825","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29825","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29825","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-29825 cve-2025-29825 microsoft edge (chromium-based) spoofing vulnerability microsoft msrc msrc"},{"id":"CVE-2025-29826","cve":"CVE-2025-29826","title":"Microsoft Dataverse Elevation of Privilege Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29826","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29826","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29826","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.3,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29826","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29826","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-29826 cve-2025-29826 microsoft dataverse elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-29827","cve":"CVE-2025-29827","title":"Azure Automation Elevation of Privilege Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29827","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29827","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29827","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.9,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29827","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29827","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2025-29827 cve-2025-29827 azure automation elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-29828","cve":"CVE-2025-29828","title":"Windows Schannel Remote Code Execution Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29828","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29828","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29828","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.1,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29828","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29828","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-29828 cve-2025-29828 windows schannel remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-29829","cve":"CVE-2025-29829","title":"Windows Trusted Runtime Interface Driver Information Disclosure Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29829","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29829","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29829","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29829","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29829","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-29829 cve-2025-29829 windows trusted runtime interface driver information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-29830","cve":"CVE-2025-29830","title":"Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29830","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29830","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29830","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29830","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29830","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-29830 cve-2025-29830 windows routing and remote access service (rras) information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-29831","cve":"CVE-2025-29831","title":"Windows Remote Desktop Services Remote Code Execution Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29831","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29831","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29831","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29831","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29831","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-29831 cve-2025-29831 windows remote desktop services remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-29832","cve":"CVE-2025-29832","title":"Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29832","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29832","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29832","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29832","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29832","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-29832 cve-2025-29832 windows routing and remote access service (rras) information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-29833","cve":"CVE-2025-29833","title":"Microsoft Virtual Machine Bus (VMBus) Remote Code Execution Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29833","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29833","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29833","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.7,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29833","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29833","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-29833 cve-2025-29833 microsoft virtual machine bus (vmbus) remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-29835","cve":"CVE-2025-29835","title":"Windows Remote Access Connection Manager Information Disclosure Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29835","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29835","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29835","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29835","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29835","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-29835 cve-2025-29835 windows remote access connection manager information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-29836","cve":"CVE-2025-29836","title":"Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29836","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29836","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29836","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29836","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29836","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-29836 cve-2025-29836 windows routing and remote access service (rras) information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-29837","cve":"CVE-2025-29837","title":"Windows Installer Information Disclosure Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29837","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29837","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29837","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29837","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29837","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-29837 cve-2025-29837 windows installer information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-29838","cve":"CVE-2025-29838","title":"Windows ExecutionContext Driver Elevation of Privilege Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29838","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29838","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29838","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.4,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29838","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29838","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-29838 cve-2025-29838 windows executioncontext driver elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-29839","cve":"CVE-2025-29839","title":"Windows Multiple UNC Provider Driver Information Disclosure Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29839","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29839","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29839","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29839","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29839","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-29839 cve-2025-29839 windows multiple unc provider driver information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-29840","cve":"CVE-2025-29840","title":"Windows Media Remote Code Execution Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29840","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29840","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29840","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29840","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29840","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-29840 cve-2025-29840 windows media remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-29841","cve":"CVE-2025-29841","title":"Universal Print Management Service Elevation of Privilege Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29841","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29841","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29841","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29841","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29841","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-29841 cve-2025-29841 universal print management service elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-29842","cve":"CVE-2025-29842","title":"UrlMon Security Feature Bypass Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29842","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29842","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29842","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29842","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29842","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-29842 cve-2025-29842 urlmon security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2025-29954","cve":"CVE-2025-29954","title":"Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29954","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29954","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29954","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.9,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29954","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29954","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-29954 cve-2025-29954 windows lightweight directory access protocol (ldap) denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2025-29955","cve":"CVE-2025-29955","title":"Windows Hyper-V Denial of Service Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29955","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29955","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29955","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.2,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29955","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29955","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-29955 cve-2025-29955 windows hyper-v denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2025-29956","cve":"CVE-2025-29956","title":"Windows SMB Information Disclosure Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29956","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29956","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29956","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.4,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29956","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29956","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-29956 cve-2025-29956 windows smb information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-29957","cve":"CVE-2025-29957","title":"Windows Deployment Services Denial of Service Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29957","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29957","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29957","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.2,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29957","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29957","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-29957 cve-2025-29957 windows deployment services denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2025-29958","cve":"CVE-2025-29958","title":"Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29958","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29958","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29958","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29958","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29958","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-29958 cve-2025-29958 windows routing and remote access service (rras) information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-29959","cve":"CVE-2025-29959","title":"Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29959","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29959","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29959","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29959","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29959","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-29959 cve-2025-29959 windows routing and remote access service (rras) information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-29960","cve":"CVE-2025-29960","title":"Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29960","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29960","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29960","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29960","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29960","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-29960 cve-2025-29960 windows routing and remote access service (rras) information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-29961","cve":"CVE-2025-29961","title":"Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29961","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29961","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29961","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29961","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29961","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-29961 cve-2025-29961 windows routing and remote access service (rras) information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-29962","cve":"CVE-2025-29962","title":"Windows Media Remote Code Execution Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29962","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29962","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29962","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29962","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29962","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-29962 cve-2025-29962 windows media remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-29963","cve":"CVE-2025-29963","title":"Windows Media Remote Code Execution Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29963","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29963","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29963","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29963","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29963","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-29963 cve-2025-29963 windows media remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-29964","cve":"CVE-2025-29964","title":"Windows Media Remote Code Execution Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29964","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29964","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29964","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29964","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29964","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-29964 cve-2025-29964 windows media remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-29966","cve":"CVE-2025-29966","title":"Remote Desktop Client Remote Code Execution Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29966","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29966","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29966","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29966","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29966","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-29966 cve-2025-29966 remote desktop client remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-29967","cve":"CVE-2025-29967","title":"Remote Desktop Client Remote Code Execution Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29967","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29967","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29967","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29967","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29967","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-29967 cve-2025-29967 remote desktop client remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-29968","cve":"CVE-2025-29968","title":"Active Directory Certificate Services (AD CS) Denial of Service Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29968","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29968","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29968","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29968","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29968","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-29968 cve-2025-29968 active directory certificate services (ad cs) denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2025-29969","cve":"CVE-2025-29969","title":"MS-EVEN RPC Remote Code Execution Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29969","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29969","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29969","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29969","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29969","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-29969 cve-2025-29969 ms-even rpc remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-29970","cve":"CVE-2025-29970","title":"Microsoft Brokering File System Elevation of Privilege Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29970","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29970","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29970","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29970","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29970","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-29970 cve-2025-29970 microsoft brokering file system elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-29971","cve":"CVE-2025-29971","title":"Web Threat Defense (WTD.sys) Denial of Service Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29971","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29971","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29971","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29971","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29971","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-29971 cve-2025-29971 web threat defense (wtd.sys) denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2025-29972","cve":"CVE-2025-29972","title":"Azure Storage Resource Provider Spoofing Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29972","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29972","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29972","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.9,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29972","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29972","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2025-29972 cve-2025-29972 azure storage resource provider spoofing vulnerability microsoft msrc msrc"},{"id":"CVE-2025-29973","cve":"CVE-2025-29973","title":"Microsoft Azure File Sync Elevation of Privilege Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29973","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29973","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29973","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29973","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29973","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-29973 cve-2025-29973 microsoft azure file sync elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-29974","cve":"CVE-2025-29974","title":"Windows Kernel Information Disclosure Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29974","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29974","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29974","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.7,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29974","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29974","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-29974 cve-2025-29974 windows kernel information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-29975","cve":"CVE-2025-29975","title":"Microsoft PC Manager Elevation of Privilege Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29975","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29975","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29975","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29975","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29975","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-29975 cve-2025-29975 microsoft pc manager elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-29976","cve":"CVE-2025-29976","title":"Microsoft SharePoint Server Elevation of Privilege Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29976","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29976","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29976","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29976","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29976","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-29976 cve-2025-29976 microsoft sharepoint server elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-29977","cve":"CVE-2025-29977","title":"Microsoft Excel Remote Code Execution Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29977","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29977","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29977","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29977","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29977","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-29977 cve-2025-29977 microsoft excel remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-29978","cve":"CVE-2025-29978","title":"Microsoft PowerPoint Remote Code Execution Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29978","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29978","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29978","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29978","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29978","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-29978 cve-2025-29978 microsoft powerpoint remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-29979","cve":"CVE-2025-29979","title":"Microsoft Excel Remote Code Execution Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29979","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29979","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29979","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29979","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29979","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-29979 cve-2025-29979 microsoft excel remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-30359","cve":"CVE-2025-30359","title":"webpack-dev-server users' source code may be stolen when they access a malicious web site","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30359","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30359","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30359","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.3,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30359","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30359","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-30359 cve-2025-30359 webpack-dev-server users' source code may be stolen when they access a malicious web site microsoft msrc msrc"},{"id":"CVE-2025-30360","cve":"CVE-2025-30360","title":"webpack-dev-server users' source code may be stolen when they access a malicious web site with non-Chromium based browser","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30360","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30360","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30360","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30360","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30360","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-30360 cve-2025-30360 webpack-dev-server users' source code may be stolen when they access a malicious web site with non-chromium based browser microsoft msrc msrc"},{"id":"CVE-2025-30375","cve":"CVE-2025-30375","title":"Microsoft Excel Remote Code Execution Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30375","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30375","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30375","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30375","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30375","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-30375 cve-2025-30375 microsoft excel remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-30376","cve":"CVE-2025-30376","title":"Microsoft Excel Remote Code Execution Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30376","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30376","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30376","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30376","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30376","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-30376 cve-2025-30376 microsoft excel remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-30377","cve":"CVE-2025-30377","title":"Microsoft Office Remote Code Execution Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30377","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30377","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30377","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.4,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30377","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30377","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-30377 cve-2025-30377 microsoft office remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-30378","cve":"CVE-2025-30378","title":"Microsoft SharePoint Server Remote Code Execution Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30378","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30378","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30378","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30378","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30378","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-30378 cve-2025-30378 microsoft sharepoint server remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-30379","cve":"CVE-2025-30379","title":"Microsoft Excel Remote Code Execution Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30379","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30379","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30379","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30379","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30379","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-30379 cve-2025-30379 microsoft excel remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-30381","cve":"CVE-2025-30381","title":"Microsoft Excel Remote Code Execution Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30381","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30381","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30381","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30381","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30381","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-30381 cve-2025-30381 microsoft excel remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-30382","cve":"CVE-2025-30382","title":"Microsoft SharePoint Server Remote Code Execution Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30382","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30382","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30382","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30382","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30382","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-30382 cve-2025-30382 microsoft sharepoint server remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-30383","cve":"CVE-2025-30383","title":"Microsoft Excel Remote Code Execution Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30383","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30383","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30383","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30383","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30383","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-30383 cve-2025-30383 microsoft excel remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-30384","cve":"CVE-2025-30384","title":"Microsoft SharePoint Server Remote Code Execution Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30384","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30384","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30384","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.4,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30384","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30384","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-30384 cve-2025-30384 microsoft sharepoint server remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-30385","cve":"CVE-2025-30385","title":"Windows Common Log File System Driver Elevation of Privilege Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30385","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30385","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30385","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30385","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30385","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-30385 cve-2025-30385 windows common log file system driver elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-30386","cve":"CVE-2025-30386","title":"Microsoft Office Remote Code Execution Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30386","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30386","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30386","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.4,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30386","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30386","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-30386 cve-2025-30386 microsoft office remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-30387","cve":"CVE-2025-30387","title":"Document Intelligence Studio On-Prem Elevation of Privilege Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30387","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30387","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30387","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30387","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30387","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2025-30387 cve-2025-30387 document intelligence studio on-prem elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-30388","cve":"CVE-2025-30388","title":"Windows Graphics Component Remote Code Execution Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30388","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30388","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30388","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30388","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30388","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-30388 cve-2025-30388 windows graphics component remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-30393","cve":"CVE-2025-30393","title":"Microsoft Excel Remote Code Execution Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30393","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30393","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30393","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30393","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30393","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-30393 cve-2025-30393 microsoft excel remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-30394","cve":"CVE-2025-30394","title":"Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30394","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30394","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30394","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.9,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30394","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30394","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-30394 cve-2025-30394 windows remote desktop gateway (rd gateway) denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2025-30397","cve":"CVE-2025-30397","title":"Scripting Engine Memory Corruption Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30397","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30397","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30397","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30397","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30397","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-30397 cve-2025-30397 scripting engine memory corruption vulnerability microsoft msrc msrc"},{"id":"CVE-2025-30399","cve":"CVE-2025-30399","title":".NET and Visual Studio Remote Code Execution Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30399","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30399","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30399","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30399","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30399","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-30399 cve-2025-30399 .net and visual studio remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-30400","cve":"CVE-2025-30400","title":"Microsoft DWM Core Library Elevation of Privilege Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30400","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30400","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30400","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30400","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30400","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-30400 cve-2025-30400 microsoft dwm core library elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-3052","cve":"CVE-2025-3052","title":"Cert CC: CVE-2025-3052 InsydeH2O Secure Boot Bypass","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-3052","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-3052","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-3052","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.7,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-3052","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-3052","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-3052 cve-2025-3052 cert cc: cve-2025-3052 insydeh2o secure boot bypass microsoft msrc msrc"},{"id":"CVE-2025-32462","cve":"CVE-2025-32462","title":"Sudo before 1.9.17p1, when used with a sudoers file that specifies a host that is neither the current host nor ALL","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32462","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32462","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32462","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":2.8,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32462","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32462","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-32462 cve-2025-32462 sudo before 1.9.17p1, when used with a sudoers file that specifies a host that is neither the current host nor all microsoft msrc msrc"},{"id":"CVE-2025-32463","cve":"CVE-2025-32463","title":"Sudo before 1.9.17p1 allows local users to obtain root access","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32463","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32463","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32463","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.3,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32463","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32463","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2025-32463 cve-2025-32463 sudo before 1.9.17p1 allows local users to obtain root access microsoft msrc msrc"},{"id":"CVE-2025-32701","cve":"CVE-2025-32701","title":"Windows Common Log File System Driver Elevation of Privilege Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32701","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32701","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32701","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32701","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32701","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-32701 cve-2025-32701 windows common log file system driver elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-32702","cve":"CVE-2025-32702","title":"Visual Studio Remote Code Execution Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32702","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32702","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32702","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32702","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32702","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-32702 cve-2025-32702 visual studio remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-32703","cve":"CVE-2025-32703","title":"Visual Studio Information Disclosure Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32703","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32703","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32703","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32703","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32703","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-32703 cve-2025-32703 visual studio information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-32704","cve":"CVE-2025-32704","title":"Microsoft Excel Remote Code Execution Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32704","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32704","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32704","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.4,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32704","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32704","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-32704 cve-2025-32704 microsoft excel remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-32705","cve":"CVE-2025-32705","title":"Microsoft Outlook Remote Code Execution Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32705","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32705","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32705","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32705","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32705","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-32705 cve-2025-32705 microsoft outlook remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-32706","cve":"CVE-2025-32706","title":"Windows Common Log File System Driver Elevation of Privilege Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32706","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32706","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32706","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32706","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32706","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-32706 cve-2025-32706 windows common log file system driver elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-32707","cve":"CVE-2025-32707","title":"NTFS Elevation of Privilege Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32707","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32707","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32707","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32707","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32707","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-32707 cve-2025-32707 ntfs elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-32709","cve":"CVE-2025-32709","title":"Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32709","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32709","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32709","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32709","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32709","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-32709 cve-2025-32709 windows ancillary function driver for winsock elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-32710","cve":"CVE-2025-32710","title":"Windows Remote Desktop Services Remote Code Execution Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32710","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32710","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32710","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.1,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32710","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32710","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-32710 cve-2025-32710 windows remote desktop services remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-32711","cve":"CVE-2025-32711","title":"M365 Copilot Information Disclosure Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32711","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32711","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32711","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.3,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32711","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32711","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2025-32711 cve-2025-32711 m365 copilot information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-32712","cve":"CVE-2025-32712","title":"Win32k Elevation of Privilege Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32712","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32712","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32712","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32712","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32712","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-32712 cve-2025-32712 win32k elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-32713","cve":"CVE-2025-32713","title":"Windows Common Log File System Driver Elevation of Privilege Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32713","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32713","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32713","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32713","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32713","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-32713 cve-2025-32713 windows common log file system driver elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-32714","cve":"CVE-2025-32714","title":"Windows Installer Elevation of Privilege Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32714","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32714","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32714","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32714","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32714","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-32714 cve-2025-32714 windows installer elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-32715","cve":"CVE-2025-32715","title":"Remote Desktop Protocol Client Information Disclosure Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32715","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32715","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32715","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32715","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32715","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-32715 cve-2025-32715 remote desktop protocol client information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-32716","cve":"CVE-2025-32716","title":"Windows Media Elevation of Privilege Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32716","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32716","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32716","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32716","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32716","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-32716 cve-2025-32716 windows media elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-32717","cve":"CVE-2025-32717","title":"Microsoft Word Remote Code Execution Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32717","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32717","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32717","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.4,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32717","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32717","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-32717 cve-2025-32717 microsoft word remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-32718","cve":"CVE-2025-32718","title":"Windows SMB Client Elevation of Privilege Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32718","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32718","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32718","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32718","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32718","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-32718 cve-2025-32718 windows smb client elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-32719","cve":"CVE-2025-32719","title":"Windows Storage Management Provider Information Disclosure Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32719","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32719","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32719","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32719","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32719","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-32719 cve-2025-32719 windows storage management provider information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-32720","cve":"CVE-2025-32720","title":"Windows Storage Management Provider Information Disclosure Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32720","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32720","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32720","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32720","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32720","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-32720 cve-2025-32720 windows storage management provider information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-32721","cve":"CVE-2025-32721","title":"Windows Recovery Driver Elevation of Privilege Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32721","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32721","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32721","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.3,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32721","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32721","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-32721 cve-2025-32721 windows recovery driver elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-32722","cve":"CVE-2025-32722","title":"Windows Storage Port Driver Information Disclosure Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32722","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32722","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32722","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32722","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32722","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-32722 cve-2025-32722 windows storage port driver information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-32724","cve":"CVE-2025-32724","title":"Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32724","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32724","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32724","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32724","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32724","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-32724 cve-2025-32724 windows local security authority subsystem service (lsass) denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2025-32725","cve":"CVE-2025-32725","title":"DHCP Server Service Denial of Service Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32725","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32725","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32725","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32725","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32725","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-32725 cve-2025-32725 dhcp server service denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2025-33050","cve":"CVE-2025-33050","title":"DHCP Server Service Denial of Service Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33050","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33050","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33050","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33050","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33050","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-33050 cve-2025-33050 dhcp server service denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2025-33052","cve":"CVE-2025-33052","title":"Windows DWM Core Library Information Disclosure Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33052","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33052","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33052","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33052","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33052","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-33052 cve-2025-33052 windows dwm core library information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-33053","cve":"CVE-2025-33053","title":"Internet Shortcut Files Remote Code Execution Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33053","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33053","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33053","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33053","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33053","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-33053 cve-2025-33053 internet shortcut files remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-33055","cve":"CVE-2025-33055","title":"Windows Storage Management Provider Information Disclosure Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33055","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33055","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33055","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33055","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33055","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-33055 cve-2025-33055 windows storage management provider information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-33056","cve":"CVE-2025-33056","title":"Windows Local Security Authority (LSA) Denial of Service Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33056","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33056","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33056","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33056","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33056","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-33056 cve-2025-33056 windows local security authority (lsa) denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2025-33057","cve":"CVE-2025-33057","title":"Windows Local Security Authority (LSA) Denial of Service Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33057","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33057","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33057","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33057","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33057","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-33057 cve-2025-33057 windows local security authority (lsa) denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2025-33058","cve":"CVE-2025-33058","title":"Windows Storage Management Provider Information Disclosure Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33058","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33058","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33058","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33058","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33058","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-33058 cve-2025-33058 windows storage management provider information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-33059","cve":"CVE-2025-33059","title":"Windows Storage Management Provider Information Disclosure Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33059","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33059","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33059","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33059","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33059","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-33059 cve-2025-33059 windows storage management provider information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-33060","cve":"CVE-2025-33060","title":"Windows Storage Management Provider Information Disclosure Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33060","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33060","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33060","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33060","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33060","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-33060 cve-2025-33060 windows storage management provider information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-33061","cve":"CVE-2025-33061","title":"Windows Storage Management Provider Information Disclosure Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33061","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33061","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33061","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33061","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33061","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-33061 cve-2025-33061 windows storage management provider information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-33062","cve":"CVE-2025-33062","title":"Windows Storage Management Provider Information Disclosure Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33062","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33062","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33062","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33062","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33062","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-33062 cve-2025-33062 windows storage management provider information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-33063","cve":"CVE-2025-33063","title":"Windows Storage Management Provider Information Disclosure Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33063","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33063","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33063","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33063","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33063","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-33063 cve-2025-33063 windows storage management provider information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-33064","cve":"CVE-2025-33064","title":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33064","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33064","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33064","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33064","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33064","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-33064 cve-2025-33064 windows routing and remote access service (rras) remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-33065","cve":"CVE-2025-33065","title":"Windows Storage Management Provider Information Disclosure Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33065","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33065","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33065","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33065","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33065","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-33065 cve-2025-33065 windows storage management provider information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-33066","cve":"CVE-2025-33066","title":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33066","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33066","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33066","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33066","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33066","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-33066 cve-2025-33066 windows routing and remote access service (rras) remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-33067","cve":"CVE-2025-33067","title":"Windows Task Scheduler Elevation of Privilege Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33067","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33067","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33067","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.4,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33067","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33067","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-33067 cve-2025-33067 windows task scheduler elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-33068","cve":"CVE-2025-33068","title":"Windows Standards-Based Storage Management Service Denial of Service Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33068","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33068","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33068","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33068","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33068","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-33068 cve-2025-33068 windows standards-based storage management service denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2025-33069","cve":"CVE-2025-33069","title":"Windows App Control for Business Security Feature Bypass Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33069","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33069","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33069","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.1,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33069","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33069","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-33069 cve-2025-33069 windows app control for business security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2025-33070","cve":"CVE-2025-33070","title":"Windows Netlogon Elevation of Privilege Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33070","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33070","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33070","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.1,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33070","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33070","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-33070 cve-2025-33070 windows netlogon elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-33071","cve":"CVE-2025-33071","title":"Windows KDC Proxy Service (KPSSVC) Remote Code Execution Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33071","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33071","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33071","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.1,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33071","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33071","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-33071 cve-2025-33071 windows kdc proxy service (kpssvc) remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-33072","cve":"CVE-2025-33072","title":"Microsoft msagsfeedback.azurewebsites.net Information Disclosure Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33072","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33072","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33072","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.1,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33072","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33072","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-33072 cve-2025-33072 microsoft msagsfeedback.azurewebsites.net information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-33073","cve":"CVE-2025-33073","title":"Windows SMB Client Elevation of Privilege Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33073","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33073","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33073","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33073","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33073","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-33073 cve-2025-33073 windows smb client elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-33075","cve":"CVE-2025-33075","title":"Windows Installer Elevation of Privilege Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33075","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33075","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33075","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33075","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33075","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-33075 cve-2025-33075 windows installer elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-37738","cve":"CVE-2025-37738","title":"ext4: ignore xattrs past end","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37738","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37738","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37738","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37738","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37738","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-37738 cve-2025-37738 ext4: ignore xattrs past end microsoft msrc msrc"},{"id":"CVE-2025-37739","cve":"CVE-2025-37739","title":"f2fs: fix to avoid out-of-bounds access in f2fs_truncate_inode_blocks()","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37739","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37739","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37739","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37739","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37739","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37739 cve-2025-37739 f2fs: fix to avoid out-of-bounds access in f2fs_truncate_inode_blocks() microsoft msrc msrc"},{"id":"CVE-2025-37740","cve":"CVE-2025-37740","title":"jfs: add sanity check for agwidth in dbMount","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37740","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37740","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37740","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37740","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37740","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37740 cve-2025-37740 jfs: add sanity check for agwidth in dbmount microsoft msrc msrc"},{"id":"CVE-2025-37741","cve":"CVE-2025-37741","title":"jfs: Prevent copying of nlink with value 0 from disk inode","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37741","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37741","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37741","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37741","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37741","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37741 cve-2025-37741 jfs: prevent copying of nlink with value 0 from disk inode microsoft msrc msrc"},{"id":"CVE-2025-37742","cve":"CVE-2025-37742","title":"jfs: Fix uninit-value access of imap allocated in the diMount() function","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37742","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37742","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37742","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37742","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37742","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37742 cve-2025-37742 jfs: fix uninit-value access of imap allocated in the dimount() function microsoft msrc msrc"},{"id":"CVE-2025-37743","cve":"CVE-2025-37743","title":"wifi: ath12k: Avoid memory leak while enabling statistics","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37743","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37743","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37743","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37743","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37743","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37743 cve-2025-37743 wifi: ath12k: avoid memory leak while enabling statistics microsoft msrc msrc"},{"id":"CVE-2025-37744","cve":"CVE-2025-37744","title":"wifi: ath12k: fix memory leak in ath12k_pci_remove()","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37744","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37744","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37744","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37744","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37744","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37744 cve-2025-37744 wifi: ath12k: fix memory leak in ath12k_pci_remove() microsoft msrc msrc"},{"id":"CVE-2025-37745","cve":"CVE-2025-37745","title":"PM: hibernate: Avoid deadlock in hibernate_compressor_param_set()","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37745","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37745","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37745","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.4,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37745","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37745","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37745 cve-2025-37745 pm: hibernate: avoid deadlock in hibernate_compressor_param_set() microsoft msrc msrc"},{"id":"CVE-2025-37747","cve":"CVE-2025-37747","title":"perf: Fix hang while freeing sigtrap event","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37747","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37747","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37747","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37747","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37747","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37747 cve-2025-37747 perf: fix hang while freeing sigtrap event microsoft msrc msrc"},{"id":"CVE-2025-37749","cve":"CVE-2025-37749","title":"net: ppp: Add bound checking for skb data on ppp_sync_txmung","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37749","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37749","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37749","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.1,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37749","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37749","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37749 cve-2025-37749 net: ppp: add bound checking for skb data on ppp_sync_txmung microsoft msrc msrc"},{"id":"CVE-2025-37750","cve":"CVE-2025-37750","title":"smb: client: fix UAF in decryption with multichannel","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37750","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37750","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37750","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37750","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37750","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-37750 cve-2025-37750 smb: client: fix uaf in decryption with multichannel microsoft msrc msrc"},{"id":"CVE-2025-37754","cve":"CVE-2025-37754","title":"drm/i915/huc: Fix fence not released on early probe errors","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37754","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37754","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37754","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37754","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37754","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37754 cve-2025-37754 drm/i915/huc: fix fence not released on early probe errors microsoft msrc msrc"},{"id":"CVE-2025-37755","cve":"CVE-2025-37755","title":"net: libwx: handle page_pool_dev_alloc_pages error","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37755","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37755","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37755","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37755","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37755","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37755 cve-2025-37755 net: libwx: handle page_pool_dev_alloc_pages error microsoft msrc msrc"},{"id":"CVE-2025-37756","cve":"CVE-2025-37756","title":"net: tls: explicitly disallow disconnect","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37756","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37756","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37756","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":3.3,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37756","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37756","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-37756 cve-2025-37756 net: tls: explicitly disallow disconnect microsoft msrc msrc"},{"id":"CVE-2025-37757","cve":"CVE-2025-37757","title":"tipc: fix memory leak in tipc_link_xmit","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37757","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37757","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37757","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.1,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37757","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37757","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37757 cve-2025-37757 tipc: fix memory leak in tipc_link_xmit microsoft msrc msrc"},{"id":"CVE-2025-37758","cve":"CVE-2025-37758","title":"ata: pata_pxa: Fix potential NULL pointer dereference in pxa_ata_probe()","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37758","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37758","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37758","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.4,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37758","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37758","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37758 cve-2025-37758 ata: pata_pxa: fix potential null pointer dereference in pxa_ata_probe() microsoft msrc msrc"},{"id":"CVE-2025-37759","cve":"CVE-2025-37759","title":"ublk: fix handling recovery &amp; reissue in ublk_abort_queue()","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37759","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37759","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37759","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37759","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37759","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37759 cve-2025-37759 ublk: fix handling recovery &amp; reissue in ublk_abort_queue() microsoft msrc msrc"},{"id":"CVE-2025-37765","cve":"CVE-2025-37765","title":"drm/nouveau: prime: fix ttm_bo_delayed_delete oops","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37765","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37765","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37765","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37765","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37765","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37765 cve-2025-37765 drm/nouveau: prime: fix ttm_bo_delayed_delete oops microsoft msrc msrc"},{"id":"CVE-2025-37766","cve":"CVE-2025-37766","title":"drm/amd/pm: Prevent division by zero","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37766","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37766","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37766","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37766","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37766","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37766 cve-2025-37766 drm/amd/pm: prevent division by zero microsoft msrc msrc"},{"id":"CVE-2025-37767","cve":"CVE-2025-37767","title":"drm/amd/pm: Prevent division by zero","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37767","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37767","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37767","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37767","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37767","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37767 cve-2025-37767 drm/amd/pm: prevent division by zero microsoft msrc msrc"},{"id":"CVE-2025-37768","cve":"CVE-2025-37768","title":"drm/amd/pm: Prevent division by zero","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37768","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37768","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37768","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37768","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37768","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37768 cve-2025-37768 drm/amd/pm: prevent division by zero microsoft msrc msrc"},{"id":"CVE-2025-37769","cve":"CVE-2025-37769","title":"drm/amd/pm/smu11: Prevent division by zero","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37769","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37769","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37769","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37769","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37769","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37769 cve-2025-37769 drm/amd/pm/smu11: prevent division by zero microsoft msrc msrc"},{"id":"CVE-2025-37770","cve":"CVE-2025-37770","title":"drm/amd/pm: Prevent division by zero","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37770","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37770","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37770","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37770","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37770","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37770 cve-2025-37770 drm/amd/pm: prevent division by zero microsoft msrc msrc"},{"id":"CVE-2025-37771","cve":"CVE-2025-37771","title":"drm/amd/pm: Prevent division by zero","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37771","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37771","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37771","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37771","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37771","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37771 cve-2025-37771 drm/amd/pm: prevent division by zero microsoft msrc msrc"},{"id":"CVE-2025-37772","cve":"CVE-2025-37772","title":"RDMA/cma: Fix workqueue crash in cma_netevent_work_handler","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37772","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37772","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37772","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37772","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37772","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37772 cve-2025-37772 rdma/cma: fix workqueue crash in cma_netevent_work_handler microsoft msrc msrc"},{"id":"CVE-2025-37773","cve":"CVE-2025-37773","title":"virtiofs: add filesystem context source name check","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37773","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37773","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37773","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37773","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37773","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37773 cve-2025-37773 virtiofs: add filesystem context source name check microsoft msrc msrc"},{"id":"CVE-2025-37775","cve":"CVE-2025-37775","title":"ksmbd: fix the warning from __kernel_write_iter","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37775","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37775","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37775","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37775","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37775","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37775 cve-2025-37775 ksmbd: fix the warning from __kernel_write_iter microsoft msrc msrc"},{"id":"CVE-2025-37776","cve":"CVE-2025-37776","title":"ksmbd: fix use-after-free in smb_break_all_levII_oplock()","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37776","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37776","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37776","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37776","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37776","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37776 cve-2025-37776 ksmbd: fix use-after-free in smb_break_all_levii_oplock() microsoft msrc msrc"},{"id":"CVE-2025-37777","cve":"CVE-2025-37777","title":"ksmbd: fix use-after-free in __smb2_lease_break_noti()","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37777","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37777","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37777","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37777","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37777","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37777 cve-2025-37777 ksmbd: fix use-after-free in __smb2_lease_break_noti() microsoft msrc msrc"},{"id":"CVE-2025-37778","cve":"CVE-2025-37778","title":"ksmbd: Fix dangling pointer in krb_authenticate","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37778","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37778","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37778","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37778","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37778","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37778 cve-2025-37778 ksmbd: fix dangling pointer in krb_authenticate microsoft msrc msrc"},{"id":"CVE-2025-37780","cve":"CVE-2025-37780","title":"isofs: Prevent the use of too small fid","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37780","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37780","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37780","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37780","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37780","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-37780 cve-2025-37780 isofs: prevent the use of too small fid microsoft msrc msrc"},{"id":"CVE-2025-37781","cve":"CVE-2025-37781","title":"i2c: cros-ec-tunnel: defer probe if parent EC is not present","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37781","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37781","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37781","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37781","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37781","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37781 cve-2025-37781 i2c: cros-ec-tunnel: defer probe if parent ec is not present microsoft msrc msrc"},{"id":"CVE-2025-37782","cve":"CVE-2025-37782","title":"Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37782","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37782","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37782","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37782","added":"2026-02-25T09:01:06.361Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37782","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37782 cve-2025-37782 rejected reason: this cve id has been rejected or withdrawn by its cve numbering authority. microsoft msrc msrc"},{"id":"CVE-2025-37786","cve":"CVE-2025-37786","title":"net: dsa: free routing table on probe failure","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37786","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37786","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37786","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37786","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37786","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37786 cve-2025-37786 net: dsa: free routing table on probe failure microsoft msrc msrc"},{"id":"CVE-2025-37787","cve":"CVE-2025-37787","title":"net: dsa: mv88e6xxx: avoid unregistering devlink regions which were never registered","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37787","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37787","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37787","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37787","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37787","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37787 cve-2025-37787 net: dsa: mv88e6xxx: avoid unregistering devlink regions which were never registered microsoft msrc msrc"},{"id":"CVE-2025-37788","cve":"CVE-2025-37788","title":"cxgb4: fix memory leak in cxgb4_init_ethtool_filters() error path","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37788","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37788","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37788","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":3.3,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37788","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37788","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-37788 cve-2025-37788 cxgb4: fix memory leak in cxgb4_init_ethtool_filters() error path microsoft msrc msrc"},{"id":"CVE-2025-37789","cve":"CVE-2025-37789","title":"net: openvswitch: fix nested key length validation in the set() action","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37789","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37789","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37789","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37789","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37789","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-37789 cve-2025-37789 net: openvswitch: fix nested key length validation in the set() action microsoft msrc msrc"},{"id":"CVE-2025-37790","cve":"CVE-2025-37790","title":"net: mctp: Set SOCK_RCU_FREE","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37790","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37790","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37790","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37790","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37790","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37790 cve-2025-37790 net: mctp: set sock_rcu_free microsoft msrc msrc"},{"id":"CVE-2025-37792","cve":"CVE-2025-37792","title":"Bluetooth: btrtl: Prevent potential NULL dereference","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37792","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37792","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37792","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37792","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37792","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37792 cve-2025-37792 bluetooth: btrtl: prevent potential null dereference microsoft msrc msrc"},{"id":"CVE-2025-37793","cve":"CVE-2025-37793","title":"ASoC: Intel: avs: Fix null-ptr-deref in avs_component_probe()","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37793","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37793","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37793","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.4,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37793","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37793","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37793 cve-2025-37793 asoc: intel: avs: fix null-ptr-deref in avs_component_probe() microsoft msrc msrc"},{"id":"CVE-2025-37794","cve":"CVE-2025-37794","title":"wifi: mac80211: Purge vif txq in ieee80211_do_stop()","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37794","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37794","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37794","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37794","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37794","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37794 cve-2025-37794 wifi: mac80211: purge vif txq in ieee80211_do_stop() microsoft msrc msrc"},{"id":"CVE-2025-37796","cve":"CVE-2025-37796","title":"wifi: at76c50x: fix use after free access in at76_disconnect","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37796","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37796","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37796","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37796","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37796","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37796 cve-2025-37796 wifi: at76c50x: fix use after free access in at76_disconnect microsoft msrc msrc"},{"id":"CVE-2025-37797","cve":"CVE-2025-37797","title":"net_sched: hfsc: Fix a UAF vulnerability in class handling","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37797","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37797","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37797","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37797","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37797","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-37797 cve-2025-37797 net_sched: hfsc: fix a uaf vulnerability in class handling microsoft msrc msrc"},{"id":"CVE-2025-37798","cve":"CVE-2025-37798","title":"codel: remove sch-&gt;q.qlen check before qdisc_tree_reduce_backlog()","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37798","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37798","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37798","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37798","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37798","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-37798 cve-2025-37798 codel: remove sch-&gt;q.qlen check before qdisc_tree_reduce_backlog() microsoft msrc msrc"},{"id":"CVE-2025-37800","cve":"CVE-2025-37800","title":"driver core: fix potential NULL pointer dereference in dev_uevent()","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37800","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37800","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37800","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37800","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37800","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37800 cve-2025-37800 driver core: fix potential null pointer dereference in dev_uevent() microsoft msrc msrc"},{"id":"CVE-2025-37801","cve":"CVE-2025-37801","title":"spi: spi-imx: Add check for spi_imx_setupxfer()","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37801","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37801","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37801","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37801","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37801","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37801 cve-2025-37801 spi: spi-imx: add check for spi_imx_setupxfer() microsoft msrc msrc"},{"id":"CVE-2025-37802","cve":"CVE-2025-37802","title":"ksmbd: fix WARNING \"do not call blocking ops when !TASK_RUNNING\"","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37802","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37802","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37802","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37802","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37802","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37802 cve-2025-37802 ksmbd: fix warning \"do not call blocking ops when !task_running\" microsoft msrc msrc"},{"id":"CVE-2025-37803","cve":"CVE-2025-37803","title":"udmabuf: fix a buf size overflow issue during udmabuf creation","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37803","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37803","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37803","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37803","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37803","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-37803 cve-2025-37803 udmabuf: fix a buf size overflow issue during udmabuf creation microsoft msrc msrc"},{"id":"CVE-2025-37804","cve":"CVE-2025-37804","title":"Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37804","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37804","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37804","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37804","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37804","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37804 cve-2025-37804 rejected reason: this cve id has been rejected or withdrawn by its cve numbering authority. microsoft msrc msrc"},{"id":"CVE-2025-37805","cve":"CVE-2025-37805","title":"sound/virtio: Fix cancel_sync warnings on uninitialized work_structs","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37805","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37805","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37805","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37805","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37805","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37805 cve-2025-37805 sound/virtio: fix cancel_sync warnings on uninitialized work_structs microsoft msrc msrc"},{"id":"CVE-2025-37806","cve":"CVE-2025-37806","title":"fs/ntfs3: Keep write operations atomic","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37806","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37806","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37806","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37806","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37806","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37806 cve-2025-37806 fs/ntfs3: keep write operations atomic microsoft msrc msrc"},{"id":"CVE-2025-37807","cve":"CVE-2025-37807","title":"bpf: Fix kmemleak warning for percpu hashmap","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37807","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37807","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37807","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37807","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37807","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-37807 cve-2025-37807 bpf: fix kmemleak warning for percpu hashmap microsoft msrc msrc"},{"id":"CVE-2025-37808","cve":"CVE-2025-37808","title":"crypto: null - Use spin lock instead of mutex","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37808","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37808","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37808","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37808","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37808","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37808 cve-2025-37808 crypto: null - use spin lock instead of mutex microsoft msrc msrc"},{"id":"CVE-2025-37810","cve":"CVE-2025-37810","title":"usb: dwc3: gadget: check that event count does not exceed event buffer length","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37810","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37810","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37810","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37810","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37810","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37810 cve-2025-37810 usb: dwc3: gadget: check that event count does not exceed event buffer length microsoft msrc msrc"},{"id":"CVE-2025-37812","cve":"CVE-2025-37812","title":"usb: cdns3: Fix deadlock when using NCM gadget","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37812","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37812","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37812","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37812","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37812","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37812 cve-2025-37812 usb: cdns3: fix deadlock when using ncm gadget microsoft msrc msrc"},{"id":"CVE-2025-37817","cve":"CVE-2025-37817","title":"mcb: fix a double free bug in chameleon_parse_gdd()","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37817","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37817","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37817","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37817","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37817","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37817 cve-2025-37817 mcb: fix a double free bug in chameleon_parse_gdd() microsoft msrc msrc"},{"id":"CVE-2025-37818","cve":"CVE-2025-37818","title":"LoongArch: Return NULL from huge_pte_offset() for invalid PMD","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37818","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37818","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37818","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37818","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37818","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37818 cve-2025-37818 loongarch: return null from huge_pte_offset() for invalid pmd microsoft msrc msrc"},{"id":"CVE-2025-37819","cve":"CVE-2025-37819","title":"irqchip/gic-v2m: Prevent use after free of gicv2m_get_fwnode()","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37819","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37819","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37819","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37819","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37819","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37819 cve-2025-37819 irqchip/gic-v2m: prevent use after free of gicv2m_get_fwnode() microsoft msrc msrc"},{"id":"CVE-2025-37820","cve":"CVE-2025-37820","title":"xen-netfront: handle NULL returned by xdp_convert_buff_to_frame()","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37820","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37820","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37820","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37820","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37820","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37820 cve-2025-37820 xen-netfront: handle null returned by xdp_convert_buff_to_frame() microsoft msrc msrc"},{"id":"CVE-2025-37822","cve":"CVE-2025-37822","title":"riscv: uprobes: Add missing fence.i after building the XOL buffer","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37822","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37822","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37822","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37822","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37822","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37822 cve-2025-37822 riscv: uprobes: add missing fence.i after building the xol buffer microsoft msrc msrc"},{"id":"CVE-2025-37823","cve":"CVE-2025-37823","title":"net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37823","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37823","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37823","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37823","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37823","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37823 cve-2025-37823 net_sched: hfsc: fix a potential uaf in hfsc_dequeue() too microsoft msrc msrc"},{"id":"CVE-2025-37824","cve":"CVE-2025-37824","title":"tipc: fix NULL pointer dereference in tipc_mon_reinit_self()","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37824","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37824","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37824","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37824","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37824","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37824 cve-2025-37824 tipc: fix null pointer dereference in tipc_mon_reinit_self() microsoft msrc msrc"},{"id":"CVE-2025-37826","cve":"CVE-2025-37826","title":"scsi: ufs: core: Add NULL check in ufshcd_mcq_compl_pending_transfer()","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37826","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37826","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37826","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37826","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37826","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37826 cve-2025-37826 scsi: ufs: core: add null check in ufshcd_mcq_compl_pending_transfer() microsoft msrc msrc"},{"id":"CVE-2025-37828","cve":"CVE-2025-37828","title":"scsi: ufs: mcq: Add NULL check in ufshcd_mcq_abort()","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37828","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37828","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37828","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37828","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37828","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37828 cve-2025-37828 scsi: ufs: mcq: add null check in ufshcd_mcq_abort() microsoft msrc msrc"},{"id":"CVE-2025-37829","cve":"CVE-2025-37829","title":"cpufreq: scpi: Fix null-ptr-deref in scpi_cpufreq_get_rate()","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37829","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37829","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37829","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37829","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37829","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37829 cve-2025-37829 cpufreq: scpi: fix null-ptr-deref in scpi_cpufreq_get_rate() microsoft msrc msrc"},{"id":"CVE-2025-37830","cve":"CVE-2025-37830","title":"cpufreq: scmi: Fix null-ptr-deref in scmi_cpufreq_get_rate()","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37830","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37830","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37830","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37830","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37830","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37830 cve-2025-37830 cpufreq: scmi: fix null-ptr-deref in scmi_cpufreq_get_rate() microsoft msrc msrc"},{"id":"CVE-2025-37831","cve":"CVE-2025-37831","title":"cpufreq: apple-soc: Fix null-ptr-deref in apple_soc_cpufreq_get_rate()","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37831","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37831","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37831","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37831","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37831","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37831 cve-2025-37831 cpufreq: apple-soc: fix null-ptr-deref in apple_soc_cpufreq_get_rate() microsoft msrc msrc"},{"id":"CVE-2025-37833","cve":"CVE-2025-37833","title":"net/niu: Niu requires MSIX ENTRY_DATA fields touch before entry reads","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37833","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37833","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37833","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37833","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37833","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37833 cve-2025-37833 net/niu: niu requires msix entry_data fields touch before entry reads microsoft msrc msrc"},{"id":"CVE-2025-37834","cve":"CVE-2025-37834","title":"mm/vmscan: don't try to reclaim hwpoison folio","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37834","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37834","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37834","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37834","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37834","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37834 cve-2025-37834 mm/vmscan: don't try to reclaim hwpoison folio microsoft msrc msrc"},{"id":"CVE-2025-37836","cve":"CVE-2025-37836","title":"PCI: Fix reference leak in pci_register_host_bridge()","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37836","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37836","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37836","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37836","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37836","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37836 cve-2025-37836 pci: fix reference leak in pci_register_host_bridge() microsoft msrc msrc"},{"id":"CVE-2025-37839","cve":"CVE-2025-37839","title":"jbd2: remove wrong sb-&gt;s_sequence check","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37839","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37839","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37839","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37839","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37839","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37839 cve-2025-37839 jbd2: remove wrong sb-&gt;s_sequence check microsoft msrc msrc"},{"id":"CVE-2025-37840","cve":"CVE-2025-37840","title":"mtd: rawnand: brcmnand: fix PM resume warning","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37840","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37840","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37840","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37840","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37840","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-37840 cve-2025-37840 mtd: rawnand: brcmnand: fix pm resume warning microsoft msrc msrc"},{"id":"CVE-2025-37841","cve":"CVE-2025-37841","title":"pm: cpupower: bench: Prevent NULL dereference on malloc failure","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37841","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37841","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37841","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37841","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37841","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37841 cve-2025-37841 pm: cpupower: bench: prevent null dereference on malloc failure microsoft msrc msrc"},{"id":"CVE-2025-37842","cve":"CVE-2025-37842","title":"spi: fsl-qspi: use devm function instead of driver remove","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37842","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37842","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37842","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37842","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37842","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37842 cve-2025-37842 spi: fsl-qspi: use devm function instead of driver remove microsoft msrc msrc"},{"id":"CVE-2025-37844","cve":"CVE-2025-37844","title":"cifs: avoid NULL pointer dereference in dbg call","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37844","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37844","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37844","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37844","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37844","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37844 cve-2025-37844 cifs: avoid null pointer dereference in dbg call microsoft msrc msrc"},{"id":"CVE-2025-37849","cve":"CVE-2025-37849","title":"KVM: arm64: Tear down vGIC on failed vCPU creation","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37849","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37849","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37849","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37849","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37849","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-37849 cve-2025-37849 kvm: arm64: tear down vgic on failed vcpu creation microsoft msrc msrc"},{"id":"CVE-2025-37851","cve":"CVE-2025-37851","title":"fbdev: omapfb: Add 'plane' value check","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37851","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37851","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37851","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37851","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37851","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37851 cve-2025-37851 fbdev: omapfb: add 'plane' value check microsoft msrc msrc"},{"id":"CVE-2025-37852","cve":"CVE-2025-37852","title":"drm/amdgpu: handle amdgpu_cgs_create_device() errors in amd_powerplay_create()","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37852","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37852","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37852","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37852","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37852","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37852 cve-2025-37852 drm/amdgpu: handle amdgpu_cgs_create_device() errors in amd_powerplay_create() microsoft msrc msrc"},{"id":"CVE-2025-37853","cve":"CVE-2025-37853","title":"drm/amdkfd: debugfs hang_hws skip GPU with MES","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37853","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37853","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37853","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37853","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37853","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37853 cve-2025-37853 drm/amdkfd: debugfs hang_hws skip gpu with mes microsoft msrc msrc"},{"id":"CVE-2025-37854","cve":"CVE-2025-37854","title":"drm/amdkfd: Fix mode1 reset crash issue","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37854","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37854","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37854","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37854","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37854","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37854 cve-2025-37854 drm/amdkfd: fix mode1 reset crash issue microsoft msrc msrc"},{"id":"CVE-2025-37855","cve":"CVE-2025-37855","title":"drm/amd/display: Guard Possible Null Pointer Dereference","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37855","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37855","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37855","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37855","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37855","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37855 cve-2025-37855 drm/amd/display: guard possible null pointer dereference microsoft msrc msrc"},{"id":"CVE-2025-37856","cve":"CVE-2025-37856","title":"btrfs: harden block_group::bg_list against list_del() races","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37856","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37856","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37856","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37856","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37856","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37856 cve-2025-37856 btrfs: harden block_group::bg_list against list_del() races microsoft msrc msrc"},{"id":"CVE-2025-37857","cve":"CVE-2025-37857","title":"scsi: st: Fix array overflow in st_setup()","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37857","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37857","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37857","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37857","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37857","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37857 cve-2025-37857 scsi: st: fix array overflow in st_setup() microsoft msrc msrc"},{"id":"CVE-2025-37858","cve":"CVE-2025-37858","title":"fs/jfs: Prevent integer overflow in AG size calculation","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37858","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37858","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37858","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37858","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37858","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-37858 cve-2025-37858 fs/jfs: prevent integer overflow in ag size calculation microsoft msrc msrc"},{"id":"CVE-2025-37859","cve":"CVE-2025-37859","title":"page_pool: avoid infinite loop to schedule delayed worker","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37859","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37859","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37859","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37859","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37859","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37859 cve-2025-37859 page_pool: avoid infinite loop to schedule delayed worker microsoft msrc msrc"},{"id":"CVE-2025-37861","cve":"CVE-2025-37861","title":"scsi: mpi3mr: Synchronous access b/w reset and tm thread for reply queue","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37861","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37861","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37861","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.1,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37861","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37861","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37861 cve-2025-37861 scsi: mpi3mr: synchronous access b/w reset and tm thread for reply queue microsoft msrc msrc"},{"id":"CVE-2025-37862","cve":"CVE-2025-37862","title":"HID: pidff: Fix null pointer dereference in pidff_find_fields","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37862","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37862","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37862","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37862","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37862","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37862 cve-2025-37862 hid: pidff: fix null pointer dereference in pidff_find_fields microsoft msrc msrc"},{"id":"CVE-2025-37864","cve":"CVE-2025-37864","title":"net: dsa: clean up FDB, MDB, VLAN entries on unbind","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37864","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37864","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37864","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37864","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37864","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37864 cve-2025-37864 net: dsa: clean up fdb, mdb, vlan entries on unbind microsoft msrc msrc"},{"id":"CVE-2025-37865","cve":"CVE-2025-37865","title":"net: dsa: mv88e6xxx: fix -ENOENT when deleting VLANs and MST is unsupported","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37865","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37865","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37865","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37865","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37865","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37865 cve-2025-37865 net: dsa: mv88e6xxx: fix -enoent when deleting vlans and mst is unsupported microsoft msrc msrc"},{"id":"CVE-2025-37867","cve":"CVE-2025-37867","title":"RDMA/core: Silence oversized kvmalloc() warning","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37867","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37867","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37867","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37867","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37867","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37867 cve-2025-37867 rdma/core: silence oversized kvmalloc() warning microsoft msrc msrc"},{"id":"CVE-2025-37870","cve":"CVE-2025-37870","title":"drm/amd/display: prevent hang on link training fail","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37870","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37870","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37870","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37870","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37870","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37870 cve-2025-37870 drm/amd/display: prevent hang on link training fail microsoft msrc msrc"},{"id":"CVE-2025-37874","cve":"CVE-2025-37874","title":"net: ngbe: fix memory leak in ngbe_probe() error path","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37874","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37874","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37874","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37874","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37874","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37874 cve-2025-37874 net: ngbe: fix memory leak in ngbe_probe() error path microsoft msrc msrc"},{"id":"CVE-2025-37875","cve":"CVE-2025-37875","title":"igc: fix PTM cycle trigger logic","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37875","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37875","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37875","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37875","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37875","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37875 cve-2025-37875 igc: fix ptm cycle trigger logic microsoft msrc msrc"},{"id":"CVE-2025-37877","cve":"CVE-2025-37877","title":"iommu: Clear iommu-dma ops on cleanup","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37877","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37877","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37877","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37877","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37877","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37877 cve-2025-37877 iommu: clear iommu-dma ops on cleanup microsoft msrc msrc"},{"id":"CVE-2025-37878","cve":"CVE-2025-37878","title":"perf/core: Fix WARN_ON(!ctx) in __free_event() for partial init","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37878","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37878","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37878","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37878","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37878","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37878 cve-2025-37878 perf/core: fix warn_on(!ctx) in __free_event() for partial init microsoft msrc msrc"},{"id":"CVE-2025-37879","cve":"CVE-2025-37879","title":"9p/net: fix improper handling of bogus negative read/write replies","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37879","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37879","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37879","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37879","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37879","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-37879 cve-2025-37879 9p/net: fix improper handling of bogus negative read/write replies microsoft msrc msrc"},{"id":"CVE-2025-37880","cve":"CVE-2025-37880","title":"um: work around sched_yield not yielding in time-travel mode","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37880","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37880","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37880","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":3.3,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37880","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37880","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-37880 cve-2025-37880 um: work around sched_yield not yielding in time-travel mode microsoft msrc msrc"},{"id":"CVE-2025-37881","cve":"CVE-2025-37881","title":"usb: gadget: aspeed: Add NULL pointer check in ast_vhub_init_dev()","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37881","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37881","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37881","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.7,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37881","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37881","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37881 cve-2025-37881 usb: gadget: aspeed: add null pointer check in ast_vhub_init_dev() microsoft msrc msrc"},{"id":"CVE-2025-37882","cve":"CVE-2025-37882","title":"usb: xhci: Fix isochronous Ring Underrun/Overrun event handling","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37882","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37882","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37882","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37882","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37882","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37882 cve-2025-37882 usb: xhci: fix isochronous ring underrun/overrun event handling microsoft msrc msrc"},{"id":"CVE-2025-37883","cve":"CVE-2025-37883","title":"s390/sclp: Add check for get_zeroed_page()","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37883","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37883","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37883","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37883","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37883","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37883 cve-2025-37883 s390/sclp: add check for get_zeroed_page() microsoft msrc msrc"},{"id":"CVE-2025-37884","cve":"CVE-2025-37884","title":"bpf: Fix deadlock between rcu_tasks_trace and event_mutex.","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37884","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37884","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37884","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37884","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37884","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37884 cve-2025-37884 bpf: fix deadlock between rcu_tasks_trace and event_mutex. microsoft msrc msrc"},{"id":"CVE-2025-37885","cve":"CVE-2025-37885","title":"KVM: x86: Reset IRTE to host control if *new* route isn't postable","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37885","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37885","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37885","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37885","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37885","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37885 cve-2025-37885 kvm: x86: reset irte to host control if *new* route isn't postable microsoft msrc msrc"},{"id":"CVE-2025-37886","cve":"CVE-2025-37886","title":"pds_core: make wait_context part of q_info","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37886","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37886","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37886","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37886","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37886","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37886 cve-2025-37886 pds_core: make wait_context part of q_info microsoft msrc msrc"},{"id":"CVE-2025-37887","cve":"CVE-2025-37887","title":"pds_core: handle unsupported PDS_CORE_CMD_FW_CONTROL result","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37887","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37887","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37887","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37887","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37887","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37887 cve-2025-37887 pds_core: handle unsupported pds_core_cmd_fw_control result microsoft msrc msrc"},{"id":"CVE-2025-37890","cve":"CVE-2025-37890","title":"net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37890","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37890","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37890","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37890","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37890","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-37890 cve-2025-37890 net_sched: hfsc: fix a uaf vulnerability in class with netem as child qdisc microsoft msrc msrc"},{"id":"CVE-2025-37891","cve":"CVE-2025-37891","title":"ALSA: ump: Fix buffer overflow at UMP SysEx message conversion","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37891","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37891","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37891","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37891","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37891","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37891 cve-2025-37891 alsa: ump: fix buffer overflow at ump sysex message conversion microsoft msrc msrc"},{"id":"CVE-2025-37892","cve":"CVE-2025-37892","title":"mtd: inftlcore: Add error check for inftl_read_oob()","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37892","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37892","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37892","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37892","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37892","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-37892 cve-2025-37892 mtd: inftlcore: add error check for inftl_read_oob() microsoft msrc msrc"},{"id":"CVE-2025-37897","cve":"CVE-2025-37897","title":"wifi: plfxlc: Remove erroneous assert in plfxlc_mac_release","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37897","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37897","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37897","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37897","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37897","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-37897 cve-2025-37897 wifi: plfxlc: remove erroneous assert in plfxlc_mac_release microsoft msrc msrc"},{"id":"CVE-2025-37899","cve":"CVE-2025-37899","title":"ksmbd: fix use-after-free in session logoff","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37899","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37899","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37899","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.7,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37899","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37899","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37899 cve-2025-37899 ksmbd: fix use-after-free in session logoff microsoft msrc msrc"},{"id":"CVE-2025-37901","cve":"CVE-2025-37901","title":"irqchip/qcom-mpm: Prevent crash when trying to handle non-wake GPIOs","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37901","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37901","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37901","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37901","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37901","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37901 cve-2025-37901 irqchip/qcom-mpm: prevent crash when trying to handle non-wake gpios microsoft msrc msrc"},{"id":"CVE-2025-37903","cve":"CVE-2025-37903","title":"drm/amd/display: Fix slab-use-after-free in hdcp","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37903","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37903","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37903","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37903","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37903","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37903 cve-2025-37903 drm/amd/display: fix slab-use-after-free in hdcp microsoft msrc msrc"},{"id":"CVE-2025-37905","cve":"CVE-2025-37905","title":"firmware: arm_scmi: Balance device refcount when destroying devices","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37905","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37905","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37905","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":2.3,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37905","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37905","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-37905 cve-2025-37905 firmware: arm_scmi: balance device refcount when destroying devices microsoft msrc msrc"},{"id":"CVE-2025-37907","cve":"CVE-2025-37907","title":"accel/ivpu: Fix locking order in ivpu_job_submit","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37907","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37907","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37907","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.7,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37907","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37907","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37907 cve-2025-37907 accel/ivpu: fix locking order in ivpu_job_submit microsoft msrc msrc"},{"id":"CVE-2025-37909","cve":"CVE-2025-37909","title":"net: lan743x: Fix memleak issue when GSO enabled","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37909","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37909","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37909","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37909","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37909","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37909 cve-2025-37909 net: lan743x: fix memleak issue when gso enabled microsoft msrc msrc"},{"id":"CVE-2025-37911","cve":"CVE-2025-37911","title":"bnxt_en: Fix out-of-bound memcpy() during ethtool -w","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37911","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37911","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37911","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37911","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37911","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37911 cve-2025-37911 bnxt_en: fix out-of-bound memcpy() during ethtool -w microsoft msrc msrc"},{"id":"CVE-2025-37913","cve":"CVE-2025-37913","title":"net_sched: qfq: Fix double list add in class with netem as child qdisc","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37913","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37913","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37913","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.3,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37913","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37913","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37913 cve-2025-37913 net_sched: qfq: fix double list add in class with netem as child qdisc microsoft msrc msrc"},{"id":"CVE-2025-37914","cve":"CVE-2025-37914","title":"net_sched: ets: Fix double list add in class with netem as child qdisc","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37914","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37914","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37914","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37914","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37914","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-37914 cve-2025-37914 net_sched: ets: fix double list add in class with netem as child qdisc microsoft msrc msrc"},{"id":"CVE-2025-37915","cve":"CVE-2025-37915","title":"net_sched: drr: Fix double list add in class with netem as child qdisc","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37915","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37915","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37915","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.3,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37915","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37915","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37915 cve-2025-37915 net_sched: drr: fix double list add in class with netem as child qdisc microsoft msrc msrc"},{"id":"CVE-2025-37916","cve":"CVE-2025-37916","title":"pds_core: remove write-after-free of client_id","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37916","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37916","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37916","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37916","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37916","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-37916 cve-2025-37916 pds_core: remove write-after-free of client_id microsoft msrc msrc"},{"id":"CVE-2025-37918","cve":"CVE-2025-37918","title":"Bluetooth: btusb: avoid NULL pointer dereference in skb_dequeue()","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37918","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37918","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37918","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.7,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37918","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37918","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37918 cve-2025-37918 bluetooth: btusb: avoid null pointer dereference in skb_dequeue() microsoft msrc msrc"},{"id":"CVE-2025-37920","cve":"CVE-2025-37920","title":"xsk: Fix race condition in AF_XDP generic RX path","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37920","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37920","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37920","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37920","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37920","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37920 cve-2025-37920 xsk: fix race condition in af_xdp generic rx path microsoft msrc msrc"},{"id":"CVE-2025-37921","cve":"CVE-2025-37921","title":"vxlan: vnifilter: Fix unlocked deletion of default FDB entry","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37921","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37921","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37921","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37921","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37921","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-37921 cve-2025-37921 vxlan: vnifilter: fix unlocked deletion of default fdb entry microsoft msrc msrc"},{"id":"CVE-2025-37922","cve":"CVE-2025-37922","title":"book3s64/radix : Align section vmemmap start address to PAGE_SIZE","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37922","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37922","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37922","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.7,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37922","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37922","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37922 cve-2025-37922 book3s64/radix : align section vmemmap start address to page_size microsoft msrc msrc"},{"id":"CVE-2025-37923","cve":"CVE-2025-37923","title":"tracing: Fix oob write in trace_seq_to_buffer()","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37923","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37923","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37923","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37923","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37923","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-37923 cve-2025-37923 tracing: fix oob write in trace_seq_to_buffer() microsoft msrc msrc"},{"id":"CVE-2025-37924","cve":"CVE-2025-37924","title":"ksmbd: fix use-after-free in kerberos authentication","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37924","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37924","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37924","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37924","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37924","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37924 cve-2025-37924 ksmbd: fix use-after-free in kerberos authentication microsoft msrc msrc"},{"id":"CVE-2025-37926","cve":"CVE-2025-37926","title":"ksmbd: fix use-after-free in ksmbd_session_rpc_open","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37926","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37926","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37926","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37926","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37926","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37926 cve-2025-37926 ksmbd: fix use-after-free in ksmbd_session_rpc_open microsoft msrc msrc"},{"id":"CVE-2025-37927","cve":"CVE-2025-37927","title":"iommu/amd: Fix potential buffer overflow in parse_ivrs_acpihid","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37927","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37927","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37927","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37927","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37927","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37927 cve-2025-37927 iommu/amd: fix potential buffer overflow in parse_ivrs_acpihid microsoft msrc msrc"},{"id":"CVE-2025-37928","cve":"CVE-2025-37928","title":"dm-bufio: don't schedule in atomic context","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37928","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37928","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37928","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37928","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37928","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-37928 cve-2025-37928 dm-bufio: don't schedule in atomic context microsoft msrc msrc"},{"id":"CVE-2025-37930","cve":"CVE-2025-37930","title":"drm/nouveau: Fix WARN_ON in nouveau_fence_context_kill()","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37930","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37930","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37930","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":2.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37930","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37930","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-37930 cve-2025-37930 drm/nouveau: fix warn_on in nouveau_fence_context_kill() microsoft msrc msrc"},{"id":"CVE-2025-37931","cve":"CVE-2025-37931","title":"btrfs: adjust subpage bit start based on sectorsize","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37931","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37931","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37931","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37931","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37931","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37931 cve-2025-37931 btrfs: adjust subpage bit start based on sectorsize microsoft msrc msrc"},{"id":"CVE-2025-37932","cve":"CVE-2025-37932","title":"sch_htb: make htb_qlen_notify() idempotent","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37932","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37932","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37932","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":2.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37932","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37932","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-37932 cve-2025-37932 sch_htb: make htb_qlen_notify() idempotent microsoft msrc msrc"},{"id":"CVE-2025-37933","cve":"CVE-2025-37933","title":"octeon_ep: Fix host hang issue during device reboot","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37933","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37933","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37933","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.6,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37933","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37933","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37933 cve-2025-37933 octeon_ep: fix host hang issue during device reboot microsoft msrc msrc"},{"id":"CVE-2025-37936","cve":"CVE-2025-37936","title":"perf/x86/intel: KVM: Mask PEBS_ENABLE loaded for guest with vCPU's value.","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37936","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37936","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37936","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37936","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37936","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-37936 cve-2025-37936 perf/x86/intel: kvm: mask pebs_enable loaded for guest with vcpu's value. microsoft msrc msrc"},{"id":"CVE-2025-37938","cve":"CVE-2025-37938","title":"tracing: Verify event formats that have \"%*p..\"","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37938","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37938","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37938","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37938","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37938","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-37938 cve-2025-37938 tracing: verify event formats that have \"%*p..\" microsoft msrc msrc"},{"id":"CVE-2025-37940","cve":"CVE-2025-37940","title":"ftrace: Add cond_resched() to ftrace_graph_set_hash()","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37940","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37940","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37940","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37940","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37940","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37940 cve-2025-37940 ftrace: add cond_resched() to ftrace_graph_set_hash() microsoft msrc msrc"},{"id":"CVE-2025-37942","cve":"CVE-2025-37942","title":"HID: pidff: Make sure to fetch pool before checking SIMULTANEOUS_MAX","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37942","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37942","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37942","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37942","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37942","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37942 cve-2025-37942 hid: pidff: make sure to fetch pool before checking simultaneous_max microsoft msrc msrc"},{"id":"CVE-2025-37943","cve":"CVE-2025-37943","title":"wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37943","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37943","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37943","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37943","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37943","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-37943 cve-2025-37943 wifi: ath12k: fix invalid data access in ath12k_dp_rx_h_undecap_nwifi microsoft msrc msrc"},{"id":"CVE-2025-37944","cve":"CVE-2025-37944","title":"wifi: ath12k: Fix invalid entry fetch in ath12k_dp_mon_srng_process","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37944","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37944","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37944","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37944","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37944","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-37944 cve-2025-37944 wifi: ath12k: fix invalid entry fetch in ath12k_dp_mon_srng_process microsoft msrc msrc"},{"id":"CVE-2025-37945","cve":"CVE-2025-37945","title":"net: phy: allow MDIO bus PM ops to start/stop state machine for phylink-controlled PHY","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37945","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37945","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37945","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37945","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37945","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37945 cve-2025-37945 net: phy: allow mdio bus pm ops to start/stop state machine for phylink-controlled phy microsoft msrc msrc"},{"id":"CVE-2025-37947","cve":"CVE-2025-37947","title":"ksmbd: prevent out-of-bounds stream writes by validating *pos","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37947","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37947","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37947","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37947","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37947","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-37947 cve-2025-37947 ksmbd: prevent out-of-bounds stream writes by validating *pos microsoft msrc msrc"},{"id":"CVE-2025-37948","cve":"CVE-2025-37948","title":"arm64: bpf: Add BHB mitigation to the epilogue for cBPF programs","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37948","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37948","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37948","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37948","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37948","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-37948 cve-2025-37948 arm64: bpf: add bhb mitigation to the epilogue for cbpf programs microsoft msrc msrc"},{"id":"CVE-2025-37951","cve":"CVE-2025-37951","title":"drm/v3d: Add job to pending list if the reset was skipped","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37951","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37951","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37951","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37951","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37951","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-37951 cve-2025-37951 drm/v3d: add job to pending list if the reset was skipped microsoft msrc msrc"},{"id":"CVE-2025-37952","cve":"CVE-2025-37952","title":"ksmbd: Fix UAF in __close_file_table_ids","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37952","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37952","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37952","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37952","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37952","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37952 cve-2025-37952 ksmbd: fix uaf in __close_file_table_ids microsoft msrc msrc"},{"id":"CVE-2025-37954","cve":"CVE-2025-37954","title":"smb: client: Avoid race in open_cached_dir with lease breaks","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37954","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37954","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37954","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37954","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37954","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37954 cve-2025-37954 smb: client: avoid race in open_cached_dir with lease breaks microsoft msrc msrc"},{"id":"CVE-2025-37956","cve":"CVE-2025-37956","title":"ksmbd: prevent rename with empty string","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37956","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37956","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37956","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37956","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37956","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37956 cve-2025-37956 ksmbd: prevent rename with empty string microsoft msrc msrc"},{"id":"CVE-2025-37957","cve":"CVE-2025-37957","title":"KVM: SVM: Forcibly leave SMM mode on SHUTDOWN interception","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37957","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37957","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37957","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37957","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37957","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37957 cve-2025-37957 kvm: svm: forcibly leave smm mode on shutdown interception microsoft msrc msrc"},{"id":"CVE-2025-37958","cve":"CVE-2025-37958","title":"mm/huge_memory: fix dereferencing invalid pmd migration entry","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37958","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37958","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37958","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37958","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37958","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-37958 cve-2025-37958 mm/huge_memory: fix dereferencing invalid pmd migration entry microsoft msrc msrc"},{"id":"CVE-2025-37959","cve":"CVE-2025-37959","title":"bpf: Scrub packet on bpf_redirect_peer","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37959","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37959","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37959","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37959","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37959","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37959 cve-2025-37959 bpf: scrub packet on bpf_redirect_peer microsoft msrc msrc"},{"id":"CVE-2025-37960","cve":"CVE-2025-37960","title":"memblock: Accept allocated memory before use in memblock_double_array()","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37960","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37960","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37960","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37960","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37960","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-37960 cve-2025-37960 memblock: accept allocated memory before use in memblock_double_array() microsoft msrc msrc"},{"id":"CVE-2025-37961","cve":"CVE-2025-37961","title":"ipvs: fix uninit-value for saddr in do_output_route4","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37961","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37961","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37961","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37961","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37961","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37961 cve-2025-37961 ipvs: fix uninit-value for saddr in do_output_route4 microsoft msrc msrc"},{"id":"CVE-2025-37963","cve":"CVE-2025-37963","title":"arm64: bpf: Only mitigate cBPF programs loaded by unprivileged users","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37963","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37963","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37963","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37963","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37963","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37963 cve-2025-37963 arm64: bpf: only mitigate cbpf programs loaded by unprivileged users microsoft msrc msrc"},{"id":"CVE-2025-37967","cve":"CVE-2025-37967","title":"usb: typec: ucsi: displayport: Fix deadlock","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37967","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37967","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37967","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37967","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37967","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37967 cve-2025-37967 usb: typec: ucsi: displayport: fix deadlock microsoft msrc msrc"},{"id":"CVE-2025-37968","cve":"CVE-2025-37968","title":"iio: light: opt3001: fix deadlock due to concurrent flag access","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37968","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37968","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37968","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37968","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37968","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-37968 cve-2025-37968 iio: light: opt3001: fix deadlock due to concurrent flag access microsoft msrc msrc"},{"id":"CVE-2025-37969","cve":"CVE-2025-37969","title":"iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_tagged_fifo","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37969","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37969","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37969","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37969","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37969","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-37969 cve-2025-37969 iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_tagged_fifo microsoft msrc msrc"},{"id":"CVE-2025-37970","cve":"CVE-2025-37970","title":"iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_fifo","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37970","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37970","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37970","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.7,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37970","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37970","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37970 cve-2025-37970 iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_fifo microsoft msrc msrc"},{"id":"CVE-2025-37972","cve":"CVE-2025-37972","title":"Input: mtk-pmic-keys - fix possible null pointer dereference","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37972","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37972","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37972","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37972","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37972","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37972 cve-2025-37972 input: mtk-pmic-keys - fix possible null pointer dereference microsoft msrc msrc"},{"id":"CVE-2025-37973","cve":"CVE-2025-37973","title":"wifi: cfg80211: fix out-of-bounds access during multi-link element defragmentation","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37973","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37973","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37973","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.7,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37973","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37973","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37973 cve-2025-37973 wifi: cfg80211: fix out-of-bounds access during multi-link element defragmentation microsoft msrc msrc"},{"id":"CVE-2025-37976","cve":"CVE-2025-37976","title":"Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37976","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37976","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37976","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37976","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37976","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-37976 cve-2025-37976 rejected reason: this cve id has been rejected or withdrawn by its cve numbering authority. microsoft msrc msrc"},{"id":"CVE-2025-37977","cve":"CVE-2025-37977","title":"scsi: ufs: exynos: Disable iocc if dma-coherent property isn't set","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37977","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37977","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37977","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37977","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37977","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-37977 cve-2025-37977 scsi: ufs: exynos: disable iocc if dma-coherent property isn't set microsoft msrc msrc"},{"id":"CVE-2025-37979","cve":"CVE-2025-37979","title":"ASoC: qcom: Fix sc7280 lpass potential buffer overflow","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37979","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37979","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37979","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37979","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37979","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37979 cve-2025-37979 asoc: qcom: fix sc7280 lpass potential buffer overflow microsoft msrc msrc"},{"id":"CVE-2025-37980","cve":"CVE-2025-37980","title":"block: fix resource leak in blk_register_queue() error path","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37980","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37980","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37980","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37980","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37980","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37980 cve-2025-37980 block: fix resource leak in blk_register_queue() error path microsoft msrc msrc"},{"id":"CVE-2025-37982","cve":"CVE-2025-37982","title":"wifi: wl1251: fix memory leak in wl1251_tx_work","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37982","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37982","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37982","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37982","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37982","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-37982 cve-2025-37982 wifi: wl1251: fix memory leak in wl1251_tx_work microsoft msrc msrc"},{"id":"CVE-2025-37983","cve":"CVE-2025-37983","title":"qibfs: fix _another_ leak","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37983","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37983","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37983","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.7,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37983","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37983","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37983 cve-2025-37983 qibfs: fix _another_ leak microsoft msrc msrc"},{"id":"CVE-2025-37984","cve":"CVE-2025-37984","title":"crypto: ecdsa - Harden against integer overflows in DIV_ROUND_UP()","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37984","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37984","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37984","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37984","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37984","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37984 cve-2025-37984 crypto: ecdsa - harden against integer overflows in div_round_up() microsoft msrc msrc"},{"id":"CVE-2025-37985","cve":"CVE-2025-37985","title":"USB: wdm: close race between wdm_open and wdm_wwan_port_stop","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37985","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37985","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37985","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.7,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37985","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37985","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37985 cve-2025-37985 usb: wdm: close race between wdm_open and wdm_wwan_port_stop microsoft msrc msrc"},{"id":"CVE-2025-37987","cve":"CVE-2025-37987","title":"pds_core: Prevent possible adminq overflow/stuck condition","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37987","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37987","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37987","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37987","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37987","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-37987 cve-2025-37987 pds_core: prevent possible adminq overflow/stuck condition microsoft msrc msrc"},{"id":"CVE-2025-37988","cve":"CVE-2025-37988","title":"fix a couple of races in MNT_TREE_BENEATH handling by do_move_mount()","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37988","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37988","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37988","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37988","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37988","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-37988 cve-2025-37988 fix a couple of races in mnt_tree_beneath handling by do_move_mount() microsoft msrc msrc"},{"id":"CVE-2025-37989","cve":"CVE-2025-37989","title":"net: phy: leds: fix memory leak","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37989","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37989","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37989","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37989","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37989","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37989 cve-2025-37989 net: phy: leds: fix memory leak microsoft msrc msrc"},{"id":"CVE-2025-37990","cve":"CVE-2025-37990","title":"wifi: brcm80211: fmac: Add error handling for brcmf_usb_dl_writeimage()","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37990","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37990","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37990","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.7,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37990","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37990","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37990 cve-2025-37990 wifi: brcm80211: fmac: add error handling for brcmf_usb_dl_writeimage() microsoft msrc msrc"},{"id":"CVE-2025-37992","cve":"CVE-2025-37992","title":"net_sched: Flush gso_skb list too during -&gt;change()","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37992","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37992","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37992","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37992","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37992","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37992 cve-2025-37992 net_sched: flush gso_skb list too during -&gt;change() microsoft msrc msrc"},{"id":"CVE-2025-37994","cve":"CVE-2025-37994","title":"usb: typec: ucsi: displayport: Fix NULL pointer access","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37994","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37994","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37994","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37994","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37994","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-37994 cve-2025-37994 usb: typec: ucsi: displayport: fix null pointer access microsoft msrc msrc"},{"id":"CVE-2025-37995","cve":"CVE-2025-37995","title":"module: ensure that kobject_put() is safe for module type kobjects","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37995","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37995","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37995","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37995","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37995","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37995 cve-2025-37995 module: ensure that kobject_put() is safe for module type kobjects microsoft msrc msrc"},{"id":"CVE-2025-37997","cve":"CVE-2025-37997","title":"netfilter: ipset: fix region locking in hash types","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37997","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37997","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37997","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37997","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37997","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-37997 cve-2025-37997 netfilter: ipset: fix region locking in hash types microsoft msrc msrc"},{"id":"CVE-2025-37998","cve":"CVE-2025-37998","title":"openvswitch: Fix unsafe attribute parsing in output_userspace()","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37998","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37998","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37998","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37998","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37998","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-37998 cve-2025-37998 openvswitch: fix unsafe attribute parsing in output_userspace() microsoft msrc msrc"},{"id":"CVE-2025-38000","cve":"CVE-2025-38000","title":"sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue()","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38000","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38000","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38000","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.6,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38000","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38000","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-38000 cve-2025-38000 sch_hfsc: fix qlen accounting bug when using peek in hfsc_enqueue() microsoft msrc msrc"},{"id":"CVE-2025-38001","cve":"CVE-2025-38001","title":"net_sched: hfsc: Address reentrant enqueue adding class to eltree twice","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38001","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38001","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38001","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38001","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38001","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-38001 cve-2025-38001 net_sched: hfsc: address reentrant enqueue adding class to eltree twice microsoft msrc msrc"},{"id":"CVE-2025-38003","cve":"CVE-2025-38003","title":"can: bcm: add missing rcu read protection for procfs content","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38003","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38003","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38003","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.6,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38003","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38003","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-38003 cve-2025-38003 can: bcm: add missing rcu read protection for procfs content microsoft msrc msrc"},{"id":"CVE-2025-38004","cve":"CVE-2025-38004","title":"can: bcm: add locking for bcm_op runtime updates","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38004","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38004","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38004","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.3,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38004","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38004","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-38004 cve-2025-38004 can: bcm: add locking for bcm_op runtime updates microsoft msrc msrc"},{"id":"CVE-2025-38006","cve":"CVE-2025-38006","title":"net: mctp: Don't access ifa_index when missing","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38006","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38006","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38006","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38006","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38006","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-38006 cve-2025-38006 net: mctp: don't access ifa_index when missing microsoft msrc msrc"},{"id":"CVE-2025-38011","cve":"CVE-2025-38011","title":"drm/amdgpu: csa unmap use uninterruptible lock","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38011","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38011","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38011","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38011","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38011","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-38011 cve-2025-38011 drm/amdgpu: csa unmap use uninterruptible lock microsoft msrc msrc"},{"id":"CVE-2025-38014","cve":"CVE-2025-38014","title":"dmaengine: idxd: Refactor remove call with idxd_cleanup() helper","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38014","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38014","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38014","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38014","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38014","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-38014 cve-2025-38014 dmaengine: idxd: refactor remove call with idxd_cleanup() helper microsoft msrc msrc"},{"id":"CVE-2025-38022","cve":"CVE-2025-38022","title":"RDMA/core: Fix \"KASAN: slab-use-after-free Read in ib_register_device\" problem","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38022","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38022","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38022","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.1,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38022","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38022","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-38022 cve-2025-38022 rdma/core: fix \"kasan: slab-use-after-free read in ib_register_device\" problem microsoft msrc msrc"},{"id":"CVE-2025-38029","cve":"CVE-2025-38029","title":"kasan: avoid sleepable page allocation from atomic context","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38029","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38029","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38029","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":2.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38029","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38029","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-38029 cve-2025-38029 kasan: avoid sleepable page allocation from atomic context microsoft msrc msrc"},{"id":"CVE-2025-38034","cve":"CVE-2025-38034","title":"btrfs: correct the order of prelim_ref arguments in btrfs__prelim_ref","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38034","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38034","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38034","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38034","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38034","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-38034 cve-2025-38034 btrfs: correct the order of prelim_ref arguments in btrfs__prelim_ref microsoft msrc msrc"},{"id":"CVE-2025-38035","cve":"CVE-2025-38035","title":"nvmet-tcp: don't restore null sk_state_change","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38035","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38035","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38035","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38035","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38035","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-38035 cve-2025-38035 nvmet-tcp: don't restore null sk_state_change microsoft msrc msrc"},{"id":"CVE-2025-38037","cve":"CVE-2025-38037","title":"vxlan: Annotate FDB data races","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38037","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38037","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38037","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":1.9,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38037","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38037","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-38037 cve-2025-38037 vxlan: annotate fdb data races microsoft msrc msrc"},{"id":"CVE-2025-38038","cve":"CVE-2025-38038","title":"cpufreq: amd-pstate: Remove unnecessary driver_lock in set_boost","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38038","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38038","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38038","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38038","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38038","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-38038 cve-2025-38038 cpufreq: amd-pstate: remove unnecessary driver_lock in set_boost microsoft msrc msrc"},{"id":"CVE-2025-38039","cve":"CVE-2025-38039","title":"net/mlx5e: Avoid WARN_ON when configuring MQPRIO with HTB offload enabled","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38039","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38039","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38039","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":2.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38039","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38039","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-38039 cve-2025-38039 net/mlx5e: avoid warn_on when configuring mqprio with htb offload enabled microsoft msrc msrc"},{"id":"CVE-2025-38040","cve":"CVE-2025-38040","title":"serial: mctrl_gpio: split disable_ms into sync and no_sync APIs","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38040","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38040","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38040","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38040","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38040","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-38040 cve-2025-38040 serial: mctrl_gpio: split disable_ms into sync and no_sync apis microsoft msrc msrc"},{"id":"CVE-2025-38041","cve":"CVE-2025-38041","title":"clk: sunxi-ng: h616: Reparent GPU clock during frequency changes","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38041","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38041","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38041","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38041","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38041","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-38041 cve-2025-38041 clk: sunxi-ng: h616: reparent gpu clock during frequency changes microsoft msrc msrc"},{"id":"CVE-2025-38042","cve":"CVE-2025-38042","title":"dmaengine: ti: k3-udma-glue: Drop skip_fdq argument from k3_udma_glue_reset_rx_chn","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38042","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38042","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38042","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38042","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38042","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-38042 cve-2025-38042 dmaengine: ti: k3-udma-glue: drop skip_fdq argument from k3_udma_glue_reset_rx_chn microsoft msrc msrc"},{"id":"CVE-2025-38043","cve":"CVE-2025-38043","title":"firmware: arm_ffa: Set dma_mask for ffa devices","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38043","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38043","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38043","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38043","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38043","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-38043 cve-2025-38043 firmware: arm_ffa: set dma_mask for ffa devices microsoft msrc msrc"},{"id":"CVE-2025-38044","cve":"CVE-2025-38044","title":"media: cx231xx: set device_caps for 417","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38044","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38044","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38044","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":2.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38044","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38044","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-38044 cve-2025-38044 media: cx231xx: set device_caps for 417 microsoft msrc msrc"},{"id":"CVE-2025-38045","cve":"CVE-2025-38045","title":"wifi: iwlwifi: fix debug actions order","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38045","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38045","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38045","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38045","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38045","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-38045 cve-2025-38045 wifi: iwlwifi: fix debug actions order microsoft msrc msrc"},{"id":"CVE-2025-38047","cve":"CVE-2025-38047","title":"x86/fred: Fix system hang during S4 resume with FRED enabled","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38047","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38047","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38047","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38047","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38047","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-38047 cve-2025-38047 x86/fred: fix system hang during s4 resume with fred enabled microsoft msrc msrc"},{"id":"CVE-2025-38048","cve":"CVE-2025-38048","title":"virtio_ring: Fix data race by tagging event_triggered as racy for KCSAN","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38048","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38048","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38048","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":2.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38048","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38048","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-38048 cve-2025-38048 virtio_ring: fix data race by tagging event_triggered as racy for kcsan microsoft msrc msrc"},{"id":"CVE-2025-38051","cve":"CVE-2025-38051","title":"smb: client: Fix use-after-free in cifs_fill_dirent","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38051","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38051","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38051","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38051","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38051","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-38051 cve-2025-38051 smb: client: fix use-after-free in cifs_fill_dirent microsoft msrc msrc"},{"id":"CVE-2025-38052","cve":"CVE-2025-38052","title":"net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38052","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38052","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38052","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38052","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38052","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-38052 cve-2025-38052 net/tipc: fix slab-use-after-free read in tipc_aead_encrypt_done microsoft msrc msrc"},{"id":"CVE-2025-38057","cve":"CVE-2025-38057","title":"espintcp: fix skb leaks","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38057","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38057","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38057","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38057","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38057","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-38057 cve-2025-38057 espintcp: fix skb leaks microsoft msrc msrc"},{"id":"CVE-2025-38058","cve":"CVE-2025-38058","title":"__legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38058","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38058","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38058","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":2.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38058","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38058","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-38058 cve-2025-38058 __legitimize_mnt(): check for mnt_sync_umount should be under mount_lock microsoft msrc msrc"},{"id":"CVE-2025-38059","cve":"CVE-2025-38059","title":"btrfs: avoid NULL pointer dereference if no valid csum tree","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38059","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38059","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38059","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38059","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38059","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-38059 cve-2025-38059 btrfs: avoid null pointer dereference if no valid csum tree microsoft msrc msrc"},{"id":"CVE-2025-38060","cve":"CVE-2025-38060","title":"bpf: copy_verifier_state() should copy 'loop_entry' field","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38060","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38060","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38060","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38060","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38060","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-38060 cve-2025-38060 bpf: copy_verifier_state() should copy 'loop_entry' field microsoft msrc msrc"},{"id":"CVE-2025-38061","cve":"CVE-2025-38061","title":"net: pktgen: fix access outside of user given buffer in pktgen_thread_write()","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38061","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38061","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38061","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.7,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38061","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38061","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-38061 cve-2025-38061 net: pktgen: fix access outside of user given buffer in pktgen_thread_write() microsoft msrc msrc"},{"id":"CVE-2025-38062","cve":"CVE-2025-38062","title":"genirq/msi: Store the IOMMU IOVA directly in msi_desc instead of iommu_cookie","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38062","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38062","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38062","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38062","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38062","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-38062 cve-2025-38062 genirq/msi: store the iommu iova directly in msi_desc instead of iommu_cookie microsoft msrc msrc"},{"id":"CVE-2025-38063","cve":"CVE-2025-38063","title":"dm: fix unconditional IO throttle caused by REQ_PREFLUSH","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38063","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38063","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38063","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38063","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38063","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-38063 cve-2025-38063 dm: fix unconditional io throttle caused by req_preflush microsoft msrc msrc"},{"id":"CVE-2025-38064","cve":"CVE-2025-38064","title":"virtio: break and reset virtio devices on device_shutdown()","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38064","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38064","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38064","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.7,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38064","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38064","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-38064 cve-2025-38064 virtio: break and reset virtio devices on device_shutdown() microsoft msrc msrc"},{"id":"CVE-2025-38065","cve":"CVE-2025-38065","title":"orangefs: Do not truncate file size","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38065","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38065","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38065","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38065","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38065","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-38065 cve-2025-38065 orangefs: do not truncate file size microsoft msrc msrc"},{"id":"CVE-2025-38066","cve":"CVE-2025-38066","title":"dm cache: prevent BUG_ON by blocking retries on failed device resumes","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38066","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38066","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38066","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38066","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38066","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-38066 cve-2025-38066 dm cache: prevent bug_on by blocking retries on failed device resumes microsoft msrc msrc"},{"id":"CVE-2025-38067","cve":"CVE-2025-38067","title":"rseq: Fix segfault on registration when rseq_cs is non-zero","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38067","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38067","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38067","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38067","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38067","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-38067 cve-2025-38067 rseq: fix segfault on registration when rseq_cs is non-zero microsoft msrc msrc"},{"id":"CVE-2025-38068","cve":"CVE-2025-38068","title":"crypto: lzo - Fix compression buffer overrun","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38068","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38068","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38068","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38068","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38068","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-38068 cve-2025-38068 crypto: lzo - fix compression buffer overrun microsoft msrc msrc"},{"id":"CVE-2025-38069","cve":"CVE-2025-38069","title":"PCI: endpoint: pci-epf-test: Fix double free that causes kernel to oops","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38069","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38069","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38069","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38069","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38069","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-38069 cve-2025-38069 pci: endpoint: pci-epf-test: fix double free that causes kernel to oops microsoft msrc msrc"},{"id":"CVE-2025-38070","cve":"CVE-2025-38070","title":"ASoC: sma1307: Add NULL check in sma1307_setting_loaded()","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38070","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38070","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38070","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38070","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38070","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-38070 cve-2025-38070 asoc: sma1307: add null check in sma1307_setting_loaded() microsoft msrc msrc"},{"id":"CVE-2025-38071","cve":"CVE-2025-38071","title":"x86/mm: Check return value from memblock_phys_alloc_range()","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38071","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38071","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38071","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.7,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38071","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38071","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-38071 cve-2025-38071 x86/mm: check return value from memblock_phys_alloc_range() microsoft msrc msrc"},{"id":"CVE-2025-38072","cve":"CVE-2025-38072","title":"libnvdimm/labels: Fix divide error in nd_label_data_init()","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38072","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38072","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38072","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38072","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38072","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-38072 cve-2025-38072 libnvdimm/labels: fix divide error in nd_label_data_init() microsoft msrc msrc"},{"id":"CVE-2025-38073","cve":"CVE-2025-38073","title":"block: fix race between set_blocksize and read paths","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38073","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38073","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38073","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.8,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38073","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38073","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-38073 cve-2025-38073 block: fix race between set_blocksize and read paths microsoft msrc msrc"},{"id":"CVE-2025-38074","cve":"CVE-2025-38074","title":"vhost-scsi: protect vq-&gt;log_used with vq-&gt;mutex","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38074","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38074","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38074","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38074","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38074","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-38074 cve-2025-38074 vhost-scsi: protect vq-&gt;log_used with vq-&gt;mutex microsoft msrc msrc"},{"id":"CVE-2025-38075","cve":"CVE-2025-38075","title":"scsi: target: iscsi: Fix timeout on deleted connection","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38075","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38075","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38075","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38075","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38075","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-38075 cve-2025-38075 scsi: target: iscsi: fix timeout on deleted connection microsoft msrc msrc"},{"id":"CVE-2025-38077","cve":"CVE-2025-38077","title":"platform/x86: dell-wmi-sysman: Avoid buffer overflow in current_password_store()","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38077","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38077","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38077","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38077","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38077","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-38077 cve-2025-38077 platform/x86: dell-wmi-sysman: avoid buffer overflow in current_password_store() microsoft msrc msrc"},{"id":"CVE-2025-38078","cve":"CVE-2025-38078","title":"ALSA: pcm: Fix race of buffer access at PCM OSS layer","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38078","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38078","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38078","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38078","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38078","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-38078 cve-2025-38078 alsa: pcm: fix race of buffer access at pcm oss layer microsoft msrc msrc"},{"id":"CVE-2025-38079","cve":"CVE-2025-38079","title":"crypto: algif_hash - fix double free in hash_accept","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38079","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38079","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38079","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38079","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38079","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-38079 cve-2025-38079 crypto: algif_hash - fix double free in hash_accept microsoft msrc msrc"},{"id":"CVE-2025-38080","cve":"CVE-2025-38080","title":"drm/amd/display: Increase block_sequence array size","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38080","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38080","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38080","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38080","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38080","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-38080 cve-2025-38080 drm/amd/display: increase block_sequence array size microsoft msrc msrc"},{"id":"CVE-2025-38081","cve":"CVE-2025-38081","title":"spi-rockchip: Fix register out of bounds access","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38081","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38081","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38081","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38081","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38081","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-38081 cve-2025-38081 spi-rockchip: fix register out of bounds access microsoft msrc msrc"},{"id":"CVE-2025-38083","cve":"CVE-2025-38083","title":"net_sched: prio: fix a race in prio_tune()","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38083","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38083","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38083","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38083","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38083","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-38083 cve-2025-38083 net_sched: prio: fix a race in prio_tune() microsoft msrc msrc"},{"id":"CVE-2025-38084","cve":"CVE-2025-38084","title":"mm/hugetlb: unshare page tables during VMA split, not before","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38084","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38084","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38084","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.3,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38084","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38084","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-38084 cve-2025-38084 mm/hugetlb: unshare page tables during vma split, not before microsoft msrc msrc"},{"id":"CVE-2025-38085","cve":"CVE-2025-38085","title":"mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38085","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38085","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38085","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.1,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38085","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38085","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-38085 cve-2025-38085 mm/hugetlb: fix huge_pmd_unshare() vs gup-fast race microsoft msrc msrc"},{"id":"CVE-2025-38086","cve":"CVE-2025-38086","title":"net: ch9200: fix uninitialised access during mii_nway_restart","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38086","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38086","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38086","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38086","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38086","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-38086 cve-2025-38086 net: ch9200: fix uninitialised access during mii_nway_restart microsoft msrc msrc"},{"id":"CVE-2025-38087","cve":"CVE-2025-38087","title":"net/sched: fix use-after-free in taprio_dev_notifier","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38087","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38087","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38087","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.4,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38087","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38087","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-38087 cve-2025-38087 net/sched: fix use-after-free in taprio_dev_notifier microsoft msrc msrc"},{"id":"CVE-2025-38088","cve":"CVE-2025-38088","title":"powerpc/powernv/memtrace: Fix out of bounds issue in memtrace mmap","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38088","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38088","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38088","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.4,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38088","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38088","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-38088 cve-2025-38088 powerpc/powernv/memtrace: fix out of bounds issue in memtrace mmap microsoft msrc msrc"},{"id":"CVE-2025-38089","cve":"CVE-2025-38089","title":"sunrpc: handle SVC_GARBAGE during svc auth processing as auth error","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38089","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38089","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38089","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38089","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38089","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-38089 cve-2025-38089 sunrpc: handle svc_garbage during svc auth processing as auth error microsoft msrc msrc"},{"id":"CVE-2025-38090","cve":"CVE-2025-38090","title":"drivers/rapidio/rio_cm.c: prevent possible heap overwrite","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38090","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38090","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38090","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38090","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38090","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-38090 cve-2025-38090 drivers/rapidio/rio_cm.c: prevent possible heap overwrite microsoft msrc msrc"},{"id":"CVE-2025-39894","cve":"CVE-2025-39894","title":"netfilter: br_netfilter: do not check confirmed bit in br_nf_local_in() after confirm","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39894","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39894","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39894","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39894","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39894","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-39894 cve-2025-39894 netfilter: br_netfilter: do not check confirmed bit in br_nf_local_in() after confirm microsoft msrc msrc"},{"id":"CVE-2025-40027","cve":"CVE-2025-40027","title":"net/9p: fix double req put in p9_fd_cancelled","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40027","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40027","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40027","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":2.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40027","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40027","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-40027 cve-2025-40027 net/9p: fix double req put in p9_fd_cancelled microsoft msrc msrc"},{"id":"CVE-2025-40049","cve":"CVE-2025-40049","title":"Squashfs: fix uninit-value in squashfs_get_parent","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40049","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40049","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40049","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40049","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40049","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-40049 cve-2025-40049 squashfs: fix uninit-value in squashfs_get_parent microsoft msrc msrc"},{"id":"CVE-2025-40057","cve":"CVE-2025-40057","title":"ptp: Add a upper bound on max_vclocks","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40057","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40057","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40057","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40057","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40057","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-40057 cve-2025-40057 ptp: add a upper bound on max_vclocks microsoft msrc msrc"},{"id":"CVE-2025-40065","cve":"CVE-2025-40065","title":"RISC-V: KVM: Write hgatp register with valid mode bits","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40065","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40065","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40065","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40065","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40065","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-40065 cve-2025-40065 risc-v: kvm: write hgatp register with valid mode bits microsoft msrc msrc"},{"id":"CVE-2025-40068","cve":"CVE-2025-40068","title":"fs: ntfs3: Fix integer overflow in run_unpack()","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40068","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40068","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40068","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40068","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40068","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-40068 cve-2025-40068 fs: ntfs3: fix integer overflow in run_unpack() microsoft msrc msrc"},{"id":"CVE-2025-40071","cve":"CVE-2025-40071","title":"tty: n_gsm: Don't block input queue by waiting MSC","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40071","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40071","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40071","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40071","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40071","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-40071 cve-2025-40071 tty: n_gsm: don't block input queue by waiting msc microsoft msrc msrc"},{"id":"CVE-2025-40075","cve":"CVE-2025-40075","title":"tcp_metrics: use dst_dev_net_rcu()","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40075","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40075","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40075","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40075","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40075","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-40075 cve-2025-40075 tcp_metrics: use dst_dev_net_rcu() microsoft msrc msrc"},{"id":"CVE-2025-40079","cve":"CVE-2025-40079","title":"riscv, bpf: Sign extend struct ops return values properly","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40079","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40079","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40079","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40079","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40079","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-40079 cve-2025-40079 riscv, bpf: sign extend struct ops return values properly microsoft msrc msrc"},{"id":"CVE-2025-40085","cve":"CVE-2025-40085","title":"ALSA: usb-audio: Fix NULL pointer deference in try_to_register_card","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40085","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40085","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40085","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40085","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40085","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-40085 cve-2025-40085 alsa: usb-audio: fix null pointer deference in try_to_register_card microsoft msrc msrc"},{"id":"CVE-2025-40087","cve":"CVE-2025-40087","title":"NFSD: Define a proc_layoutcommit for the FlexFiles layout type","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40087","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40087","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40087","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40087","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40087","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-40087 cve-2025-40087 nfsd: define a proc_layoutcommit for the flexfiles layout type microsoft msrc msrc"},{"id":"CVE-2025-40090","cve":"CVE-2025-40090","title":"ksmbd: fix recursive locking in RPC handle list access","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40090","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40090","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40090","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40090","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40090","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-40090 cve-2025-40090 ksmbd: fix recursive locking in rpc handle list access microsoft msrc msrc"},{"id":"CVE-2025-40092","cve":"CVE-2025-40092","title":"usb: gadget: f_ncm: Refactor bind path to use __free()","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40092","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40092","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40092","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40092","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40092","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-40092 cve-2025-40092 usb: gadget: f_ncm: refactor bind path to use __free() microsoft msrc msrc"},{"id":"CVE-2025-40093","cve":"CVE-2025-40093","title":"usb: gadget: f_ecm: Refactor bind path to use __free()","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40093","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40093","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40093","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40093","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40093","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-40093 cve-2025-40093 usb: gadget: f_ecm: refactor bind path to use __free() microsoft msrc msrc"},{"id":"CVE-2025-40094","cve":"CVE-2025-40094","title":"usb: gadget: f_acm: Refactor bind path to use __free()","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40094","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40094","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40094","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40094","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40094","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-40094 cve-2025-40094 usb: gadget: f_acm: refactor bind path to use __free() microsoft msrc msrc"},{"id":"CVE-2025-40095","cve":"CVE-2025-40095","title":"usb: gadget: f_rndis: Refactor bind path to use __free()","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40095","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40095","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40095","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40095","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40095","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-40095 cve-2025-40095 usb: gadget: f_rndis: refactor bind path to use __free() microsoft msrc msrc"},{"id":"CVE-2025-40096","cve":"CVE-2025-40096","title":"drm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40096","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40096","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40096","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40096","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40096","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-40096 cve-2025-40096 drm/sched: fix potential double free in drm_sched_job_add_resv_dependencies microsoft msrc msrc"},{"id":"CVE-2025-40097","cve":"CVE-2025-40097","title":"ALSA: hda: Fix missing pointer check in hda_component_manager_init function","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40097","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40097","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40097","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40097","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40097","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-40097 cve-2025-40097 alsa: hda: fix missing pointer check in hda_component_manager_init function microsoft msrc msrc"},{"id":"CVE-2025-40099","cve":"CVE-2025-40099","title":"cifs: parse_dfs_referrals: prevent oob on malformed input","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40099","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40099","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40099","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.3,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40099","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40099","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-40099 cve-2025-40099 cifs: parse_dfs_referrals: prevent oob on malformed input microsoft msrc msrc"},{"id":"CVE-2025-40100","cve":"CVE-2025-40100","title":"btrfs: do not assert we found block group item when creating free space tree","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40100","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40100","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40100","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40100","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40100","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-40100 cve-2025-40100 btrfs: do not assert we found block group item when creating free space tree microsoft msrc msrc"},{"id":"CVE-2025-40102","cve":"CVE-2025-40102","title":"KVM: arm64: Prevent access to vCPU events before init","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40102","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40102","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40102","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40102","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40102","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-40102 cve-2025-40102 kvm: arm64: prevent access to vcpu events before init microsoft msrc msrc"},{"id":"CVE-2025-40103","cve":"CVE-2025-40103","title":"smb: client: Fix refcount leak for cifs_sb_tlink","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40103","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40103","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40103","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40103","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40103","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-40103 cve-2025-40103 smb: client: fix refcount leak for cifs_sb_tlink microsoft msrc msrc"},{"id":"CVE-2025-40105","cve":"CVE-2025-40105","title":"vfs: Don't leak disconnected dentries on umount","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40105","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40105","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40105","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40105","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40105","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-40105 cve-2025-40105 vfs: don't leak disconnected dentries on umount microsoft msrc msrc"},{"id":"CVE-2025-40775","cve":"CVE-2025-40775","title":"DNS message with invalid TSIG causes an assertion failure","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40775","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40775","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40775","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40775","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40775","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-40775 cve-2025-40775 dns message with invalid tsig causes an assertion failure microsoft msrc msrc"},{"id":"CVE-2025-40909","cve":"CVE-2025-40909","title":"Perl threads have a working directory race condition where file operations may target unintended paths","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40909","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40909","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40909","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.9,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40909","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40909","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-40909 cve-2025-40909 perl threads have a working directory race condition where file operations may target unintended paths microsoft msrc msrc"},{"id":"CVE-2025-40914","cve":"CVE-2025-40914","title":"Perl CryptX before version 0.087 contains a dependency that may be susceptible to an integer overflow","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40914","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40914","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40914","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.8,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40914","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40914","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2025-40914 cve-2025-40914 perl cryptx before version 0.087 contains a dependency that may be susceptible to an integer overflow microsoft msrc msrc"},{"id":"CVE-2025-4138","cve":"CVE-2025-4138","title":"Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4138","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4138","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4138","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4138","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4138","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-4138 cve-2025-4138 bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory microsoft msrc msrc"},{"id":"CVE-2025-4207","cve":"CVE-2025-4207","title":"PostgreSQL GB18030 encoding validation can read one byte past end of allocation for text that fails validation","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4207","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4207","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4207","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.9,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4207","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4207","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-4207 cve-2025-4207 postgresql gb18030 encoding validation can read one byte past end of allocation for text that fails validation microsoft msrc msrc"},{"id":"CVE-2025-4287","cve":"CVE-2025-4287","title":"PyTorch nccl.py torch.cuda.nccl.reduce denial of service","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4287","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4287","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4287","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":3.3,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4287","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4287","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-4287 cve-2025-4287 pytorch nccl.py torch.cuda.nccl.reduce denial of service microsoft msrc msrc"},{"id":"CVE-2025-4330","cve":"CVE-2025-4330","title":"Extraction filter bypass for linking outside extraction directory","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4330","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4330","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4330","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4330","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4330","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-4330 cve-2025-4330 extraction filter bypass for linking outside extraction directory microsoft msrc msrc"},{"id":"CVE-2025-4373","cve":"CVE-2025-4373","title":"Glib: buffer underflow on glib through glib/gstring.c via function g_string_insert_unichar","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4373","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4373","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4373","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4373","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4373","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-4373 cve-2025-4373 glib: buffer underflow on glib through glib/gstring.c via function g_string_insert_unichar microsoft msrc msrc"},{"id":"CVE-2025-4432","cve":"CVE-2025-4432","title":"Ring: some aes functions may panic when overflow checking is enabled in ring","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4432","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4432","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4432","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.3,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4432","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4432","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-4432 cve-2025-4432 ring: some aes functions may panic when overflow checking is enabled in ring microsoft msrc msrc"},{"id":"CVE-2025-4435","cve":"CVE-2025-4435","title":"Tarfile extracts filtered members when errorlevel=0","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4435","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4435","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4435","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4435","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4435","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-4435 cve-2025-4435 tarfile extracts filtered members when errorlevel=0 microsoft msrc msrc"},{"id":"CVE-2025-4476","cve":"CVE-2025-4476","title":"Libsoup: null pointer dereference in libsoup may lead to denial of service","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4476","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4476","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4476","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.3,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4476","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4476","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-4476 cve-2025-4476 libsoup: null pointer dereference in libsoup may lead to denial of service microsoft msrc msrc"},{"id":"CVE-2025-44904","cve":"CVE-2025-44904","title":"hdf5 v1.14.6 was discovered to contain a heap buffer overflow via the H5VM_memcpyvv function.","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-44904","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-44904","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-44904","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-44904","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-44904","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-44904 cve-2025-44904 hdf5 v1.14.6 was discovered to contain a heap buffer overflow via the h5vm_memcpyvv function. microsoft msrc msrc"},{"id":"CVE-2025-44905","cve":"CVE-2025-44905","title":"hdf5 v1.14.6 was discovered to contain a heap buffer overflow via the H5Z__filter_scaleoffset function.","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-44905","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-44905","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-44905","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.3,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-44905","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-44905","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-44905 cve-2025-44905 hdf5 v1.14.6 was discovered to contain a heap buffer overflow via the h5z__filter_scaleoffset function. microsoft msrc msrc"},{"id":"CVE-2025-4517","cve":"CVE-2025-4517","title":"Arbitrary writes via tarfile realpath overflow","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4517","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4517","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4517","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.4,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4517","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4517","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2025-4517 cve-2025-4517 arbitrary writes via tarfile realpath overflow microsoft msrc msrc"},{"id":"CVE-2025-4563","cve":"CVE-2025-4563","title":"Nodes can bypass dynamic resource allocation authorization checks","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4563","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4563","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4563","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":2.7,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4563","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4563","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-4563 cve-2025-4563 nodes can bypass dynamic resource allocation authorization checks microsoft msrc msrc"},{"id":"CVE-2025-4565","cve":"CVE-2025-4565","title":"Unbounded recursion in Python Protobuf","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4565","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4565","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4565","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.3,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4565","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4565","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-4565 cve-2025-4565 unbounded recursion in python protobuf microsoft msrc msrc"},{"id":"CVE-2025-4574","cve":"CVE-2025-4574","title":"Crossbeam-channel: crossbeam-channel vulnerable to double free on drop","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4574","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4574","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4574","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4574","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4574","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-4574 cve-2025-4574 crossbeam-channel: crossbeam-channel vulnerable to double free on drop microsoft msrc msrc"},{"id":"CVE-2025-4575","cve":"CVE-2025-4575","title":"The x509 application adds trusted use instead of rejected use","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4575","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4575","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4575","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4575","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4575","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-4575 cve-2025-4575 the x509 application adds trusted use instead of rejected use microsoft msrc msrc"},{"id":"CVE-2025-4598","cve":"CVE-2025-4598","title":"Systemd-coredump: race condition that allows a local attacker to crash a suid program and gain read access to the resulting core dump","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4598","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4598","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4598","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.7,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4598","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4598","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-4598 cve-2025-4598 systemd-coredump: race condition that allows a local attacker to crash a suid program and gain read access to the resulting core dump microsoft msrc msrc"},{"id":"CVE-2025-46712","cve":"CVE-2025-46712","title":"Erlang/OTP SSH Has Strict KEX Violations","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-46712","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-46712","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-46712","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":3.7,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-46712","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-46712","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-46712 cve-2025-46712 erlang/otp ssh has strict kex violations microsoft msrc msrc"},{"id":"CVE-2025-4673","cve":"CVE-2025-4673","title":"Sensitive headers not cleared on cross-origin redirect in net/http","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4673","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4673","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4673","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.8,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4673","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4673","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-4673 cve-2025-4673 sensitive headers not cleared on cross-origin redirect in net/http microsoft msrc msrc"},{"id":"CVE-2025-46836","cve":"CVE-2025-46836","title":"net-tools Stack-based Buffer Overflow vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-46836","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-46836","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-46836","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.6,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-46836","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-46836","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-46836 cve-2025-46836 net-tools stack-based buffer overflow vulnerability microsoft msrc msrc"},{"id":"CVE-2025-47160","cve":"CVE-2025-47160","title":"Windows Shortcut Files Security Feature Bypass Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47160","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47160","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47160","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.4,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47160","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47160","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-47160 cve-2025-47160 windows shortcut files security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2025-47161","cve":"CVE-2025-47161","title":"Microsoft Defender for Endpoint Elevation of Privilege Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47161","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47161","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47161","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47161","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47161","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-47161 cve-2025-47161 microsoft defender for endpoint elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-47162","cve":"CVE-2025-47162","title":"Microsoft Office Remote Code Execution Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47162","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47162","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47162","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.4,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47162","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47162","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-47162 cve-2025-47162 microsoft office remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-47163","cve":"CVE-2025-47163","title":"Microsoft SharePoint Server Remote Code Execution Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47163","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47163","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47163","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47163","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47163","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-47163 cve-2025-47163 microsoft sharepoint server remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-47164","cve":"CVE-2025-47164","title":"Microsoft Office Remote Code Execution Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47164","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47164","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47164","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.4,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47164","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47164","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-47164 cve-2025-47164 microsoft office remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-47165","cve":"CVE-2025-47165","title":"Microsoft Excel Remote Code Execution Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47165","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47165","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47165","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47165","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47165","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-47165 cve-2025-47165 microsoft excel remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-47166","cve":"CVE-2025-47166","title":"Microsoft SharePoint Server Remote Code Execution Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47166","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47166","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47166","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47166","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47166","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-47166 cve-2025-47166 microsoft sharepoint server remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-47167","cve":"CVE-2025-47167","title":"Microsoft Office Remote Code Execution Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47167","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47167","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47167","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.4,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47167","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47167","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-47167 cve-2025-47167 microsoft office remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-47168","cve":"CVE-2025-47168","title":"Microsoft Word Remote Code Execution Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47168","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47168","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47168","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47168","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47168","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-47168 cve-2025-47168 microsoft word remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-47169","cve":"CVE-2025-47169","title":"Microsoft Word Remote Code Execution Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47169","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47169","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47169","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47169","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47169","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-47169 cve-2025-47169 microsoft word remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-47170","cve":"CVE-2025-47170","title":"Microsoft Word Remote Code Execution Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47170","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47170","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47170","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47170","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47170","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-47170 cve-2025-47170 microsoft word remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-47171","cve":"CVE-2025-47171","title":"Microsoft Outlook Remote Code Execution Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47171","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47171","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47171","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.7,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47171","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47171","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-47171 cve-2025-47171 microsoft outlook remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-47172","cve":"CVE-2025-47172","title":"Microsoft SharePoint Server Remote Code Execution Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47172","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47172","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47172","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47172","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47172","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-47172 cve-2025-47172 microsoft sharepoint server remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-47173","cve":"CVE-2025-47173","title":"Microsoft Office Remote Code Execution Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47173","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47173","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47173","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47173","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47173","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-47173 cve-2025-47173 microsoft office remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-47174","cve":"CVE-2025-47174","title":"Microsoft Excel Remote Code Execution Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47174","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47174","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47174","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47174","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47174","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-47174 cve-2025-47174 microsoft excel remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-47175","cve":"CVE-2025-47175","title":"Microsoft PowerPoint Remote Code Execution Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47175","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47175","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47175","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47175","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47175","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-47175 cve-2025-47175 microsoft powerpoint remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-47176","cve":"CVE-2025-47176","title":"Microsoft Outlook Remote Code Execution Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47176","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47176","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47176","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47176","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47176","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-47176 cve-2025-47176 microsoft outlook remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-47181","cve":"CVE-2025-47181","title":"Microsoft Edge (Chromium-based) Update Elevation of Privilege Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47181","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47181","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47181","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47181","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47181","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-47181 cve-2025-47181 microsoft edge (chromium-based) update elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-47182","cve":"CVE-2025-47182","title":"Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47182","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47182","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47182","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.6,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47182","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47182","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-47182 cve-2025-47182 microsoft edge (chromium-based) elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-47268","cve":"CVE-2025-47268","title":"ping in iputils before 20250602 allows a denial of service","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47268","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47268","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47268","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47268","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47268","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-47268 cve-2025-47268 ping in iputils before 20250602 allows a denial of service microsoft msrc msrc"},{"id":"CVE-2025-47273","cve":"CVE-2025-47273","title":"setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47273","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47273","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47273","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47273","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47273","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-47273 cve-2025-47273 setuptools has a path traversal vulnerability in packageindex.download that leads to arbitrary file write microsoft msrc msrc"},{"id":"CVE-2025-47279","cve":"CVE-2025-47279","title":"undici Denial of Service attack via bad certificate data","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47279","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47279","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47279","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":3.1,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47279","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47279","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-47279 cve-2025-47279 undici denial of service attack via bad certificate data microsoft msrc msrc"},{"id":"CVE-2025-47291","cve":"CVE-2025-47291","title":"containerd CRI plugin: Incorrect cgroup hierarchy assignment for containers running in usernamespaced Kubernetes pods.","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47291","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47291","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47291","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47291","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47291","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-47291 cve-2025-47291 containerd cri plugin: incorrect cgroup hierarchy assignment for containers running in usernamespaced kubernetes pods. microsoft msrc msrc"},{"id":"CVE-2025-47711","cve":"CVE-2025-47711","title":"Nbdkit: nbdkit-server: off-by-one error when processing block status may lead to a denial of service","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47711","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47711","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47711","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.3,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47711","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47711","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-47711 cve-2025-47711 nbdkit: nbdkit-server: off-by-one error when processing block status may lead to a denial of service microsoft msrc msrc"},{"id":"CVE-2025-47712","cve":"CVE-2025-47712","title":"Nbd: nbdkit: integer overflow triggers an assertion resulting in denial of service","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47712","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47712","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47712","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.3,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47712","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47712","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-47712 cve-2025-47712 nbd: nbdkit: integer overflow triggers an assertion resulting in denial of service microsoft msrc msrc"},{"id":"CVE-2025-47732","cve":"CVE-2025-47732","title":"Microsoft Dataverse Remote Code Execution Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47732","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47732","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47732","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.7,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47732","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47732","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-47732 cve-2025-47732 microsoft dataverse remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-47733","cve":"CVE-2025-47733","title":"Microsoft Power Apps Information Disclosure Vulnerability","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47733","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47733","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47733","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.1,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47733","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47733","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2025-47733 cve-2025-47733 microsoft power apps information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-47827","cve":"CVE-2025-47827","title":"MITRE CVE-2025-47827: Secure Boot bypass in IGEL OS before 11","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47827","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47827","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47827","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.6,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47827","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47827","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-47827 cve-2025-47827 mitre cve-2025-47827: secure boot bypass in igel os before 11 microsoft msrc msrc"},{"id":"CVE-2025-47912","cve":"CVE-2025-47912","title":"Insufficient validation of bracketed IPv6 hostnames in net/url","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47912","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47912","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47912","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.7,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47912","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47912","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-47912 cve-2025-47912 insufficient validation of bracketed ipv6 hostnames in net/url microsoft msrc msrc"},{"id":"CVE-2025-47950","cve":"CVE-2025-47950","title":"CoreDNS Vulnerable to DoQ Memory Exhaustion via Stream Amplification","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47950","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47950","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47950","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47950","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47950","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-47950 cve-2025-47950 coredns vulnerable to doq memory exhaustion via stream amplification microsoft msrc msrc"},{"id":"CVE-2025-47953","cve":"CVE-2025-47953","title":"Microsoft Office Remote Code Execution Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47953","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47953","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47953","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.4,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47953","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47953","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-47953 cve-2025-47953 microsoft office remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-47955","cve":"CVE-2025-47955","title":"Windows Remote Access Connection Manager Elevation of Privilege Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47955","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47955","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47955","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47955","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47955","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-47955 cve-2025-47955 windows remote access connection manager elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-47956","cve":"CVE-2025-47956","title":"Windows Security App Spoofing Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47956","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47956","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47956","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47956","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47956","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-47956 cve-2025-47956 windows security app spoofing vulnerability microsoft msrc msrc"},{"id":"CVE-2025-47957","cve":"CVE-2025-47957","title":"Microsoft Word Remote Code Execution Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47957","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47957","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47957","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.4,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47957","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47957","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-47957 cve-2025-47957 microsoft word remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-47959","cve":"CVE-2025-47959","title":"Visual Studio Remote Code Execution Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47959","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47959","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47959","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47959","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47959","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-47959 cve-2025-47959 visual studio remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-47962","cve":"CVE-2025-47962","title":"Windows SDK Elevation of Privilege Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47962","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47962","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47962","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47962","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47962","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-47962 cve-2025-47962 windows sdk elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-47963","cve":"CVE-2025-47963","title":"Microsoft Edge (Chromium-based) Spoofing Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47963","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47963","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47963","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.3,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47963","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47963","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-47963 cve-2025-47963 microsoft edge (chromium-based) spoofing vulnerability microsoft msrc msrc"},{"id":"CVE-2025-47964","cve":"CVE-2025-47964","title":"Microsoft Edge (Chromium-based) Spoofing Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47964","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47964","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47964","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.4,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47964","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47964","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-47964 cve-2025-47964 microsoft edge (chromium-based) spoofing vulnerability microsoft msrc msrc"},{"id":"CVE-2025-47966","cve":"CVE-2025-47966","title":"Power Automate Elevation of Privilege Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47966","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47966","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47966","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.8,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47966","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47966","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2025-47966 cve-2025-47966 power automate elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-47968","cve":"CVE-2025-47968","title":"Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47968","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47968","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47968","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47968","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47968","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-47968 cve-2025-47968 microsoft autoupdate (mau) elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-47969","cve":"CVE-2025-47969","title":"Windows Virtualization-Based Security (VBS) Information Disclosure Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47969","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47969","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47969","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.4,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47969","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47969","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-47969 cve-2025-47969 windows virtualization-based security (vbs) information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-47977","cve":"CVE-2025-47977","title":"Nuance Digital Engagement Platform Spoofing Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47977","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47977","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47977","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.2,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47977","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47977","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-47977 cve-2025-47977 nuance digital engagement platform spoofing vulnerability microsoft msrc msrc"},{"id":"CVE-2025-47979","cve":"CVE-2025-47979","title":"Microsoft Failover Cluster Information Disclosure Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47979","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47979","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47979","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47979","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47979","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-47979 cve-2025-47979 microsoft failover cluster information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-47989","cve":"CVE-2025-47989","title":"Arc Enabled Servers - Azure Connected Machine Agent Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47989","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47989","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47989","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47989","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47989","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-47989 cve-2025-47989 arc enabled servers - azure connected machine agent elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-48004","cve":"CVE-2025-48004","title":"Microsoft Brokering File System Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48004","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48004","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48004","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.4,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48004","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48004","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-48004 cve-2025-48004 microsoft brokering file system elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-4802","cve":"CVE-2025-4802","title":"Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in staticall","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4802","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4802","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4802","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.4,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4802","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4802","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-4802 cve-2025-4802 untrusted ld_library_path environment variable vulnerability in the gnu c library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in staticall microsoft msrc msrc"},{"id":"CVE-2025-48060","cve":"CVE-2025-48060","title":"AddressSanitizer: stack-buffer-overflow in jq_fuzz_execute (jv_string_vfmt)","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48060","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48060","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48060","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48060","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48060","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-48060 cve-2025-48060 addresssanitizer: stack-buffer-overflow in jq_fuzz_execute (jv_string_vfmt) microsoft msrc msrc"},{"id":"CVE-2025-48387","cve":"CVE-2025-48387","title":"tar-fs has issue where extract can write outside the specified dir with a specific tarball","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48387","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48387","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48387","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.2,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48387","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48387","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-48387 cve-2025-48387 tar-fs has issue where extract can write outside the specified dir with a specific tarball microsoft msrc msrc"},{"id":"CVE-2025-48813","cve":"CVE-2025-48813","title":"Virtual Secure Mode Spoofing Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48813","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48813","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48813","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.3,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48813","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48813","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-48813 cve-2025-48813 virtual secure mode spoofing vulnerability microsoft msrc msrc"},{"id":"CVE-2025-49112","cve":"CVE-2025-49112","title":"setDeferredReply in networking.c in Valkey through 8.1.1 has an integer underflow","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49112","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49112","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49112","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":3.1,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49112","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49112","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-49112 cve-2025-49112 setdeferredreply in networking.c in valkey through 8.1.1 has an integer underflow microsoft msrc msrc"},{"id":"CVE-2025-49133","cve":"CVE-2025-49133","title":"Libtpms contains a possible out-of-bound access and abort due to HMAC signing issue","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49133","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49133","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49133","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.9,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49133","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49133","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-49133 cve-2025-49133 libtpms contains a possible out-of-bound access and abort due to hmac signing issue microsoft msrc msrc"},{"id":"CVE-2025-49175","cve":"CVE-2025-49175","title":"Xorg-x11-server-xwayland: xorg-x11-server: tigervnc: out-of-bounds read in x rendering extension animated cursors","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49175","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49175","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49175","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49175","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49175","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-49175 cve-2025-49175 xorg-x11-server-xwayland: xorg-x11-server: tigervnc: out-of-bounds read in x rendering extension animated cursors microsoft msrc msrc"},{"id":"CVE-2025-49176","cve":"CVE-2025-49176","title":"Xorg-x11-server-xwayland: xorg-x11-server: tigervnc: integer overflow in big requests extension","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49176","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49176","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49176","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.6,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49176","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49176","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-49176 cve-2025-49176 xorg-x11-server-xwayland: xorg-x11-server: tigervnc: integer overflow in big requests extension microsoft msrc msrc"},{"id":"CVE-2025-49177","cve":"CVE-2025-49177","title":"Xorg-x11-server-xwayland: xorg-x11-server: tigervnc: data leak in xfixes extension's xfixessetclientdisconnectmode","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49177","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49177","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49177","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49177","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49177","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-49177 cve-2025-49177 xorg-x11-server-xwayland: xorg-x11-server: tigervnc: data leak in xfixes extension's xfixessetclientdisconnectmode microsoft msrc msrc"},{"id":"CVE-2025-49178","cve":"CVE-2025-49178","title":"Xorg-x11-server-xwayland: xorg-x11-server: tigervnc: unprocessed client request due to bytes to ignore","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49178","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49178","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49178","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49178","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49178","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-49178 cve-2025-49178 xorg-x11-server-xwayland: xorg-x11-server: tigervnc: unprocessed client request due to bytes to ignore microsoft msrc msrc"},{"id":"CVE-2025-49179","cve":"CVE-2025-49179","title":"Xorg-x11-server-xwayland: xorg-x11-server: tigervnc: integer overflow in x record extension","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49179","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49179","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49179","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.6,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49179","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49179","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-49179 cve-2025-49179 xorg-x11-server-xwayland: xorg-x11-server: tigervnc: integer overflow in x record extension microsoft msrc msrc"},{"id":"CVE-2025-49180","cve":"CVE-2025-49180","title":"Xorg-x11-server-xwayland: xorg-x11-server: tigervnc: integer overflow in x resize, rotate and reflect (randr) extension","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49180","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49180","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49180","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.1,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49180","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49180","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-49180 cve-2025-49180 xorg-x11-server-xwayland: xorg-x11-server: tigervnc: integer overflow in x resize, rotate and reflect (randr) extension microsoft msrc msrc"},{"id":"CVE-2025-4947","cve":"CVE-2025-4947","title":"QUIC certificate check skip with wolfSSL","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4947","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4947","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4947","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4947","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4947","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-4947 cve-2025-4947 quic certificate check skip with wolfssl microsoft msrc msrc"},{"id":"CVE-2025-4948","cve":"CVE-2025-4948","title":"Libsoup: integer underflow in soup_multipart_new_from_message() leading to denial of service in libsoup","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4948","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4948","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4948","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4948","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4948","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-4948 cve-2025-4948 libsoup: integer underflow in soup_multipart_new_from_message() leading to denial of service in libsoup microsoft msrc msrc"},{"id":"CVE-2025-4969","cve":"CVE-2025-4969","title":"Libsoup: off-by-one out-of-bounds read in find_boundary() in soup-multipart.c","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4969","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4969","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4969","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4969","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4969","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-4969 cve-2025-4969 libsoup: off-by-one out-of-bounds read in find_boundary() in soup-multipart.c microsoft msrc msrc"},{"id":"CVE-2025-49708","cve":"CVE-2025-49708","title":"Microsoft Graphics Component Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49708","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49708","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49708","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.9,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49708","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49708","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2025-49708 cve-2025-49708 microsoft graphics component elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-49715","cve":"CVE-2025-49715","title":"Dynamics 365 FastTrack Implementation Assets Information Disclosure Vulnerability","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49715","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49715","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49715","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49715","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49715","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-49715 cve-2025-49715 dynamics 365 fasttrack implementation assets information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-49794","cve":"CVE-2025-49794","title":"Libxml: heap use after free (uaf) leads to denial of service (dos)","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49794","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49794","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49794","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.1,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49794","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49794","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2025-49794 cve-2025-49794 libxml: heap use after free (uaf) leads to denial of service (dos) microsoft msrc msrc"},{"id":"CVE-2025-49795","cve":"CVE-2025-49795","title":"Libxml: null pointer dereference leads to denial of service (dos)","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49795","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49795","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49795","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49795","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49795","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-49795 cve-2025-49795 libxml: null pointer dereference leads to denial of service (dos) microsoft msrc msrc"},{"id":"CVE-2025-49796","cve":"CVE-2025-49796","title":"Libxml: type confusion leads to denial of service (dos)","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49796","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49796","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49796","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.1,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49796","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49796","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2025-49796 cve-2025-49796 libxml: type confusion leads to denial of service (dos) microsoft msrc msrc"},{"id":"CVE-2025-50152","cve":"CVE-2025-50152","title":"Windows Kernel Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50152","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50152","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50152","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50152","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50152","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-50152 cve-2025-50152 windows kernel elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-50174","cve":"CVE-2025-50174","title":"Windows Device Association Broker Service Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50174","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50174","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50174","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50174","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50174","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-50174 cve-2025-50174 windows device association broker service elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-50175","cve":"CVE-2025-50175","title":"Windows Digital Media Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50175","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50175","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50175","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50175","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50175","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-50175 cve-2025-50175 windows digital media elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-50181","cve":"CVE-2025-50181","title":"urllib3 redirects are not disabled when retries are disabled on PoolManager instantiation","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50181","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50181","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50181","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.3,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50181","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50181","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-50181 cve-2025-50181 urllib3 redirects are not disabled when retries are disabled on poolmanager instantiation microsoft msrc msrc"},{"id":"CVE-2025-50182","cve":"CVE-2025-50182","title":"urllib3 does not control redirects in browsers and Node.js","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50182","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50182","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50182","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.3,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50182","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50182","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-50182 cve-2025-50182 urllib3 does not control redirects in browsers and node.js microsoft msrc msrc"},{"id":"CVE-2025-50200","cve":"CVE-2025-50200","title":"RabbitMQ Node can log Basic Auth header from an HTTP request","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50200","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50200","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50200","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50200","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50200","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-50200 cve-2025-50200 rabbitmq node can log basic auth header from an http request microsoft msrc msrc"},{"id":"CVE-2025-5025","cve":"CVE-2025-5025","title":"No QUIC certificate pinning with wolfSSL","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5025","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5025","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5025","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.8,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5025","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5025","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-5025 cve-2025-5025 no quic certificate pinning with wolfssl microsoft msrc msrc"},{"id":"CVE-2025-5222","cve":"CVE-2025-5222","title":"Icu: stack buffer overflow in the srbroot::addtag function","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5222","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5222","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5222","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5222","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5222","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-5222 cve-2025-5222 icu: stack buffer overflow in the srbroot::addtag function microsoft msrc msrc"},{"id":"CVE-2025-5244","cve":"CVE-2025-5244","title":"GNU Binutils ld elflink.c elf_gc_sweep memory corruption","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5244","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5244","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5244","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.3,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5244","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5244","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-5244 cve-2025-5244 gnu binutils ld elflink.c elf_gc_sweep memory corruption microsoft msrc msrc"},{"id":"CVE-2025-5245","cve":"CVE-2025-5245","title":"GNU Binutils objdump debug.c debug_type_samep memory corruption","source_published":"2025-05-13","source_updated":"2026-03-31","source_doc_published":"2025-05-13","source_doc_updated":"2026-03-31","published":"2025-05-13","date":"2025-05-13","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5245","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5245","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5245","published":"2025-05-13","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.3,"cve_published":null,"cve_updated":null,"published_at":"2025-05-13","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5245","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5245","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-05-13","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-5245 cve-2025-5245 gnu binutils objdump debug.c debug_type_samep memory corruption microsoft msrc msrc"},{"id":"CVE-2025-52555","cve":"CVE-2025-52555","title":"CephFS Permission Escalation Vulnerability in Ceph Fuse mounted FS","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-52555","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-52555","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-52555","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-52555","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-52555","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-52555 cve-2025-52555 cephfs permission escalation vulnerability in ceph fuse mounted fs microsoft msrc msrc"},{"id":"CVE-2025-53139","cve":"CVE-2025-53139","title":"Windows Hello Security Feature Bypass Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53139","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53139","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53139","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.7,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53139","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53139","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-53139 cve-2025-53139 windows hello security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2025-53150","cve":"CVE-2025-53150","title":"Windows Digital Media Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53150","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53150","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53150","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53150","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53150","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-53150 cve-2025-53150 windows digital media elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-5318","cve":"CVE-2025-5318","title":"Libssh: out-of-bounds read in sftp_handle()","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5318","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5318","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5318","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.4,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5318","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5318","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-5318 cve-2025-5318 libssh: out-of-bounds read in sftp_handle() microsoft msrc msrc"},{"id":"CVE-2025-53717","cve":"CVE-2025-53717","title":"Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53717","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53717","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53717","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53717","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53717","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-53717 cve-2025-53717 windows virtualization-based security (vbs) enclave elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-53768","cve":"CVE-2025-53768","title":"Xbox IStorageService Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53768","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53768","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53768","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53768","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53768","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-53768 cve-2025-53768 xbox istorageservice elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-53782","cve":"CVE-2025-53782","title":"Microsoft Exchange Server Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53782","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53782","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53782","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.4,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53782","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53782","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-53782 cve-2025-53782 microsoft exchange server elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-54132","cve":"CVE-2025-54132","title":"GitHub CVE-2025-54132: Arbitrary Image Fetch in Mermaid Diagram Tool","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54132","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54132","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54132","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.4,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54132","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54132","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-54132 cve-2025-54132 github cve-2025-54132: arbitrary image fetch in mermaid diagram tool microsoft msrc msrc"},{"id":"CVE-2025-5455","cve":"CVE-2025-5455","title":"Possible denial of service when passing malformed data in a URL to qDecodeDataUrl","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5455","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5455","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5455","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5455","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5455","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-5455 cve-2025-5455 possible denial of service when passing malformed data in a url to qdecodedataurl microsoft msrc msrc"},{"id":"CVE-2025-54957","cve":"CVE-2025-54957","title":"MITRE CVE-2025-54957: Integer overflow in Dolby Digital Plus audio decoder","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54957","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54957","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54957","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54957","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54957","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-54957 cve-2025-54957 mitre cve-2025-54957: integer overflow in dolby digital plus audio decoder microsoft msrc msrc"},{"id":"CVE-2025-55240","cve":"CVE-2025-55240","title":"Visual Studio Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55240","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55240","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55240","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.3,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55240","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55240","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-55240 cve-2025-55240 visual studio elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-55247","cve":"CVE-2025-55247","title":".NET Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55247","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55247","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55247","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.3,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55247","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55247","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-55247 cve-2025-55247 .net elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-55248","cve":"CVE-2025-55248","title":".NET, .NET Framework, and Visual Studio Information Disclosure Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55248","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55248","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55248","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55248","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55248","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-55248 cve-2025-55248 .net, .net framework, and visual studio information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-55315","cve":"CVE-2025-55315","title":"ASP.NET Security Feature Bypass Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55315","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55315","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55315","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.9,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55315","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55315","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2025-55315 cve-2025-55315 asp.net security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2025-55320","cve":"CVE-2025-55320","title":"Configuration Manager Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55320","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55320","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55320","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55320","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55320","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-55320 cve-2025-55320 configuration manager elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-55321","cve":"CVE-2025-55321","title":"Azure Monitor Log Analytics Spoofing Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55321","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55321","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55321","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.3,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55321","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55321","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2025-55321 cve-2025-55321 azure monitor log analytics spoofing vulnerability microsoft msrc msrc"},{"id":"CVE-2025-55325","cve":"CVE-2025-55325","title":"Windows Storage Management Provider Information Disclosure Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55325","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55325","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55325","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55325","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55325","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-55325 cve-2025-55325 windows storage management provider information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-55326","cve":"CVE-2025-55326","title":"Windows Connected Devices Platform Service (Cdpsvc) Remote Code Execution Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55326","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55326","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55326","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55326","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55326","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-55326 cve-2025-55326 windows connected devices platform service (cdpsvc) remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-55328","cve":"CVE-2025-55328","title":"Windows Hyper-V Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55328","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55328","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55328","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55328","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55328","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-55328 cve-2025-55328 windows hyper-v elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-55330","cve":"CVE-2025-55330","title":"Windows BitLocker Security Feature Bypass Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55330","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55330","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55330","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.1,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55330","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55330","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-55330 cve-2025-55330 windows bitlocker security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2025-55331","cve":"CVE-2025-55331","title":"Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55331","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55331","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55331","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55331","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55331","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-55331 cve-2025-55331 windows printworkflowusersvc elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-55332","cve":"CVE-2025-55332","title":"Windows BitLocker Security Feature Bypass Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55332","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55332","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55332","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.1,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55332","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55332","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-55332 cve-2025-55332 windows bitlocker security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2025-55333","cve":"CVE-2025-55333","title":"Windows BitLocker Security Feature Bypass Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55333","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55333","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55333","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.1,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55333","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55333","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-55333 cve-2025-55333 windows bitlocker security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2025-55334","cve":"CVE-2025-55334","title":"Windows Kernel Security Feature Bypass Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55334","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55334","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55334","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.2,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55334","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55334","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-55334 cve-2025-55334 windows kernel security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2025-55335","cve":"CVE-2025-55335","title":"Windows NTFS Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55335","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55335","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55335","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.4,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55335","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55335","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-55335 cve-2025-55335 windows ntfs elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-55336","cve":"CVE-2025-55336","title":"Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55336","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55336","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55336","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55336","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55336","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-55336 cve-2025-55336 windows cloud files mini filter driver information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-55337","cve":"CVE-2025-55337","title":"Windows BitLocker Security Feature Bypass Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55337","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55337","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55337","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.1,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55337","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55337","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-55337 cve-2025-55337 windows bitlocker security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2025-55338","cve":"CVE-2025-55338","title":"Windows BitLocker Security Feature Bypass Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55338","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55338","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55338","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.1,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55338","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55338","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-55338 cve-2025-55338 windows bitlocker security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2025-55339","cve":"CVE-2025-55339","title":"Windows Network Driver Interface Specification (NDIS) Driver Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55339","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55339","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55339","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55339","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55339","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-55339 cve-2025-55339 windows network driver interface specification (ndis) driver elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-55340","cve":"CVE-2025-55340","title":"Windows Remote Desktop Protocol Security Feature Bypass","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55340","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55340","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55340","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55340","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55340","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-55340 cve-2025-55340 windows remote desktop protocol security feature bypass microsoft msrc msrc"},{"id":"CVE-2025-55676","cve":"CVE-2025-55676","title":"Windows USB Video Class System Driver Information Disclosure Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55676","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55676","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55676","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55676","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55676","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-55676 cve-2025-55676 windows usb video class system driver information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-55677","cve":"CVE-2025-55677","title":"Windows Device Association Broker Service Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55677","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55677","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55677","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55677","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55677","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-55677 cve-2025-55677 windows device association broker service elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-55678","cve":"CVE-2025-55678","title":"DirectX Graphics Kernel Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55678","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55678","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55678","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55678","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55678","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-55678 cve-2025-55678 directx graphics kernel elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-55679","cve":"CVE-2025-55679","title":"Windows Kernel Information Disclosure Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55679","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55679","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55679","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.1,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55679","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55679","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-55679 cve-2025-55679 windows kernel information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-55680","cve":"CVE-2025-55680","title":"Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55680","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55680","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55680","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55680","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55680","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-55680 cve-2025-55680 windows cloud files mini filter driver elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-55681","cve":"CVE-2025-55681","title":"Desktop Window Manager Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55681","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55681","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55681","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55681","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55681","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-55681 cve-2025-55681 desktop window manager elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-55682","cve":"CVE-2025-55682","title":"Windows BitLocker Security Feature Bypass Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55682","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55682","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55682","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.1,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55682","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55682","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-55682 cve-2025-55682 windows bitlocker security feature bypass vulnerability microsoft msrc msrc"},{"id":"CVE-2025-55683","cve":"CVE-2025-55683","title":"Windows Kernel Information Disclosure Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55683","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55683","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55683","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55683","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55683","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-55683 cve-2025-55683 windows kernel information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-55684","cve":"CVE-2025-55684","title":"Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55684","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55684","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55684","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55684","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55684","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-55684 cve-2025-55684 windows printworkflowusersvc elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-55685","cve":"CVE-2025-55685","title":"Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55685","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55685","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55685","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55685","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55685","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-55685 cve-2025-55685 windows printworkflowusersvc elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-55686","cve":"CVE-2025-55686","title":"Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55686","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55686","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55686","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55686","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55686","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-55686 cve-2025-55686 windows printworkflowusersvc elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-55687","cve":"CVE-2025-55687","title":"Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55687","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55687","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55687","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.4,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55687","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55687","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-55687 cve-2025-55687 windows resilient file system (refs) elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-55688","cve":"CVE-2025-55688","title":"Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55688","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55688","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55688","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55688","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55688","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-55688 cve-2025-55688 windows printworkflowusersvc elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-55689","cve":"CVE-2025-55689","title":"Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55689","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55689","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55689","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55689","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55689","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-55689 cve-2025-55689 windows printworkflowusersvc elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-55690","cve":"CVE-2025-55690","title":"Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55690","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55690","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55690","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55690","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55690","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-55690 cve-2025-55690 windows printworkflowusersvc elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-55691","cve":"CVE-2025-55691","title":"Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55691","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55691","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55691","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55691","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55691","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-55691 cve-2025-55691 windows printworkflowusersvc elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-55692","cve":"CVE-2025-55692","title":"Windows Error Reporting Service Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55692","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55692","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55692","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55692","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55692","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-55692 cve-2025-55692 windows error reporting service elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-55693","cve":"CVE-2025-55693","title":"Windows Kernel Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55693","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55693","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55693","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.4,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55693","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55693","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-55693 cve-2025-55693 windows kernel elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-55694","cve":"CVE-2025-55694","title":"Windows Error Reporting Service Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55694","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55694","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55694","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55694","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55694","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-55694 cve-2025-55694 windows error reporting service elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-55695","cve":"CVE-2025-55695","title":"Windows WLAN AutoConfig Service Information Disclosure Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55695","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55695","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55695","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55695","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55695","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-55695 cve-2025-55695 windows wlan autoconfig service information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-55696","cve":"CVE-2025-55696","title":"NtQueryInformation Token function (ntifs.h) Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55696","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55696","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55696","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55696","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55696","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-55696 cve-2025-55696 ntqueryinformation token function (ntifs.h) elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-55697","cve":"CVE-2025-55697","title":"Azure Local Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55697","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55697","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55697","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55697","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55697","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-55697 cve-2025-55697 azure local elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-55698","cve":"CVE-2025-55698","title":"DirectX Graphics Kernel Denial of Service Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55698","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55698","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55698","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.7,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55698","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55698","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-55698 cve-2025-55698 directx graphics kernel denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2025-55699","cve":"CVE-2025-55699","title":"Windows Kernel Information Disclosure Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55699","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55699","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55699","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55699","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55699","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-55699 cve-2025-55699 windows kernel information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-55700","cve":"CVE-2025-55700","title":"Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55700","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55700","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55700","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55700","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55700","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-55700 cve-2025-55700 windows routing and remote access service (rras) information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-55701","cve":"CVE-2025-55701","title":"Windows Authentication Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55701","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55701","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55701","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55701","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55701","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-55701 cve-2025-55701 windows authentication elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-5791","cve":"CVE-2025-5791","title":"Users: `root` appended to group listings","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5791","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5791","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5791","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5791","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5791","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-5791 cve-2025-5791 users: `root` appended to group listings microsoft msrc msrc"},{"id":"CVE-2025-58183","cve":"CVE-2025-58183","title":"Unbounded allocation when parsing GNU sparse map in archive/tar","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58183","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58183","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58183","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58183","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58183","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-58183 cve-2025-58183 unbounded allocation when parsing gnu sparse map in archive/tar microsoft msrc msrc"},{"id":"CVE-2025-58186","cve":"CVE-2025-58186","title":"Lack of limit when parsing cookies can cause memory exhaustion in net/http","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58186","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58186","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58186","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.3,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58186","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58186","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-58186 cve-2025-58186 lack of limit when parsing cookies can cause memory exhaustion in net/http microsoft msrc msrc"},{"id":"CVE-2025-58187","cve":"CVE-2025-58187","title":"Quadratic complexity when checking name constraints in crypto/x509","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58187","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58187","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58187","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.3,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58187","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58187","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-58187 cve-2025-58187 quadratic complexity when checking name constraints in crypto/x509 microsoft msrc msrc"},{"id":"CVE-2025-58189","cve":"CVE-2025-58189","title":"ALPN negotiation error contains attacker controlled information in crypto/tls","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58189","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58189","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58189","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58189","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58189","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-58189 cve-2025-58189 alpn negotiation error contains attacker controlled information in crypto/tls microsoft msrc msrc"},{"id":"CVE-2025-58714","cve":"CVE-2025-58714","title":"Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58714","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58714","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58714","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58714","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58714","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-58714 cve-2025-58714 windows ancillary function driver for winsock elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-58715","cve":"CVE-2025-58715","title":"Windows Speech Runtime Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58715","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58715","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58715","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58715","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58715","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-58715 cve-2025-58715 windows speech runtime elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-58716","cve":"CVE-2025-58716","title":"Windows Speech Runtime Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58716","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58716","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58716","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58716","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58716","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-58716 cve-2025-58716 windows speech runtime elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-58717","cve":"CVE-2025-58717","title":"Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58717","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58717","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58717","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58717","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58717","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-58717 cve-2025-58717 windows routing and remote access service (rras) information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-58718","cve":"CVE-2025-58718","title":"Remote Desktop Client Remote Code Execution Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58718","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58718","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58718","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58718","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58718","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-58718 cve-2025-58718 remote desktop client remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-58719","cve":"CVE-2025-58719","title":"Windows Connected Devices Platform Service Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58719","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58719","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58719","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.7,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58719","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58719","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-58719 cve-2025-58719 windows connected devices platform service elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-58720","cve":"CVE-2025-58720","title":"Windows Cryptographic Services Information Disclosure Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58720","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58720","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58720","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58720","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58720","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-58720 cve-2025-58720 windows cryptographic services information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-58722","cve":"CVE-2025-58722","title":"Microsoft DWM Core Library Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58722","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58722","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58722","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58722","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58722","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-58722 cve-2025-58722 microsoft dwm core library elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-58724","cve":"CVE-2025-58724","title":"Arc Enabled Servers - Azure Connected Machine Agent Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58724","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58724","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58724","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58724","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58724","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-58724 cve-2025-58724 arc enabled servers - azure connected machine agent elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-58725","cve":"CVE-2025-58725","title":"Windows COM+ Event System Service Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58725","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58725","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58725","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58725","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58725","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-58725 cve-2025-58725 windows com+ event system service elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-58726","cve":"CVE-2025-58726","title":"Windows SMB Server Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58726","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58726","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58726","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58726","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58726","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-58726 cve-2025-58726 windows smb server elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-58727","cve":"CVE-2025-58727","title":"Windows Connected Devices Platform Service Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58727","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58727","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58727","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58727","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58727","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-58727 cve-2025-58727 windows connected devices platform service elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-58728","cve":"CVE-2025-58728","title":"Windows Bluetooth Service Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58728","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58728","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58728","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58728","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58728","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-58728 cve-2025-58728 windows bluetooth service elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-58729","cve":"CVE-2025-58729","title":"Windows Local Session Manager (LSM) Denial of Service Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58729","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58729","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58729","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58729","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58729","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-58729 cve-2025-58729 windows local session manager (lsm) denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2025-58730","cve":"CVE-2025-58730","title":"Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58730","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58730","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58730","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58730","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58730","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-58730 cve-2025-58730 inbox com objects (global memory) remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-58731","cve":"CVE-2025-58731","title":"Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58731","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58731","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58731","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58731","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58731","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-58731 cve-2025-58731 inbox com objects (global memory) remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-58732","cve":"CVE-2025-58732","title":"Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58732","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58732","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58732","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58732","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58732","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-58732 cve-2025-58732 inbox com objects (global memory) remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-58733","cve":"CVE-2025-58733","title":"Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58733","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58733","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58733","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58733","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58733","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-58733 cve-2025-58733 inbox com objects (global memory) remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-58734","cve":"CVE-2025-58734","title":"Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58734","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58734","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58734","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58734","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58734","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-58734 cve-2025-58734 inbox com objects (global memory) remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-58735","cve":"CVE-2025-58735","title":"Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58735","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58735","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58735","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58735","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58735","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-58735 cve-2025-58735 inbox com objects (global memory) remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-58736","cve":"CVE-2025-58736","title":"Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58736","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58736","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58736","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58736","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58736","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-58736 cve-2025-58736 inbox com objects (global memory) remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-58737","cve":"CVE-2025-58737","title":"Remote Desktop Protocol Remote Code Execution Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58737","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58737","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58737","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58737","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58737","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-58737 cve-2025-58737 remote desktop protocol remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-58738","cve":"CVE-2025-58738","title":"Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58738","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58738","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58738","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58738","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58738","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-58738 cve-2025-58738 inbox com objects (global memory) remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-58739","cve":"CVE-2025-58739","title":"Microsoft Windows File Explorer Spoofing Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58739","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58739","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58739","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58739","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58739","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-58739 cve-2025-58739 microsoft windows file explorer spoofing vulnerability microsoft msrc msrc"},{"id":"CVE-2025-5889","cve":"CVE-2025-5889","title":"juliangruber brace-expansion index.js expand redos","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5889","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5889","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5889","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":3.1,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5889","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5889","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-5889 cve-2025-5889 juliangruber brace-expansion index.js expand redos microsoft msrc msrc"},{"id":"CVE-2025-5914","cve":"CVE-2025-5914","title":"Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5914","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5914","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5914","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":3.9,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5914","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5914","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-5914 cve-2025-5914 libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c microsoft msrc msrc"},{"id":"CVE-2025-5915","cve":"CVE-2025-5915","title":"Libarchive: heap buffer over read in copy_from_lzss_window() at archive_read_support_format_rar.c","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5915","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5915","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5915","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":3.9,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5915","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5915","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-5915 cve-2025-5915 libarchive: heap buffer over read in copy_from_lzss_window() at archive_read_support_format_rar.c microsoft msrc msrc"},{"id":"CVE-2025-5916","cve":"CVE-2025-5916","title":"Libarchive: integer overflow while reading warc files at archive_read_support_format_warc.c","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5916","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5916","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5916","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":3.9,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5916","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5916","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-5916 cve-2025-5916 libarchive: integer overflow while reading warc files at archive_read_support_format_warc.c microsoft msrc msrc"},{"id":"CVE-2025-5917","cve":"CVE-2025-5917","title":"Libarchive: off by one error in build_ustar_entry_name() at archive_write_set_format_pax.c","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5917","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5917","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5917","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":2.8,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5917","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5917","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-5917 cve-2025-5917 libarchive: off by one error in build_ustar_entry_name() at archive_write_set_format_pax.c microsoft msrc msrc"},{"id":"CVE-2025-5918","cve":"CVE-2025-5918","title":"Libarchive: reading past eof may be triggered for piped file streams","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5918","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5918","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5918","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":3.9,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5918","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5918","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-5918 cve-2025-5918 libarchive: reading past eof may be triggered for piped file streams microsoft msrc msrc"},{"id":"CVE-2025-59184","cve":"CVE-2025-59184","title":"Storage Spaces Direct Information Disclosure Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59184","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59184","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59184","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59184","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59184","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-59184 cve-2025-59184 storage spaces direct information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59185","cve":"CVE-2025-59185","title":"NTLM Hash Disclosure Spoofing Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59185","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59185","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59185","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59185","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59185","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-59185 cve-2025-59185 ntlm hash disclosure spoofing vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59186","cve":"CVE-2025-59186","title":"Windows Kernel Information Disclosure Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59186","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59186","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59186","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59186","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59186","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-59186 cve-2025-59186 windows kernel information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59187","cve":"CVE-2025-59187","title":"Windows Kernel Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59187","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59187","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59187","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59187","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59187","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59187 cve-2025-59187 windows kernel elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59188","cve":"CVE-2025-59188","title":"Microsoft Failover Cluster Information Disclosure Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59188","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59188","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59188","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59188","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59188","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-59188 cve-2025-59188 microsoft failover cluster information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59189","cve":"CVE-2025-59189","title":"Microsoft Brokering File System Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59189","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59189","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59189","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.4,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59189","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59189","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59189 cve-2025-59189 microsoft brokering file system elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59190","cve":"CVE-2025-59190","title":"Windows Search Service Denial of Service Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59190","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59190","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59190","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59190","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59190","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-59190 cve-2025-59190 windows search service denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59191","cve":"CVE-2025-59191","title":"Windows Connected Devices Platform Service Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59191","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59191","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59191","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59191","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59191","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59191 cve-2025-59191 windows connected devices platform service elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59192","cve":"CVE-2025-59192","title":"Storport.sys Driver Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59192","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59192","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59192","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59192","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59192","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59192 cve-2025-59192 storport.sys driver elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59193","cve":"CVE-2025-59193","title":"Windows Management Services Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59193","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59193","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59193","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59193","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59193","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59193 cve-2025-59193 windows management services elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59194","cve":"CVE-2025-59194","title":"Windows Kernel Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59194","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59194","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59194","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59194","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59194","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59194 cve-2025-59194 windows kernel elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59195","cve":"CVE-2025-59195","title":"Windows Graphics Component Denial of Service Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59195","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59195","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59195","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59195","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59195","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59195 cve-2025-59195 windows graphics component denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59196","cve":"CVE-2025-59196","title":"Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59196","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59196","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59196","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59196","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59196","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59196 cve-2025-59196 windows simple search and discovery protocol (ssdp) service elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59197","cve":"CVE-2025-59197","title":"Windows ETL Channel Information Disclosure Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59197","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59197","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59197","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59197","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59197","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-59197 cve-2025-59197 windows etl channel information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59198","cve":"CVE-2025-59198","title":"Windows Search Service Denial of Service Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59198","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59198","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59198","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59198","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59198","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-59198 cve-2025-59198 windows search service denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59199","cve":"CVE-2025-59199","title":"Software Protection Platform (SPP) Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59199","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59199","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59199","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59199","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59199","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59199 cve-2025-59199 software protection platform (spp) elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59200","cve":"CVE-2025-59200","title":"Data Sharing Service Spoofing Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59200","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59200","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59200","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.7,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59200","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59200","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59200 cve-2025-59200 data sharing service spoofing vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59201","cve":"CVE-2025-59201","title":"Network Connection Status Indicator (NCSI) Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59201","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59201","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59201","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59201","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59201","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59201 cve-2025-59201 network connection status indicator (ncsi) elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59202","cve":"CVE-2025-59202","title":"Windows Remote Desktop Services Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59202","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59202","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59202","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59202","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59202","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59202 cve-2025-59202 windows remote desktop services elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59203","cve":"CVE-2025-59203","title":"Windows State Repository API Server File Information Disclosure Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59203","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59203","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59203","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59203","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59203","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-59203 cve-2025-59203 windows state repository api server file information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59204","cve":"CVE-2025-59204","title":"Windows Management Services Information Disclosure Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59204","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59204","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59204","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59204","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59204","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-59204 cve-2025-59204 windows management services information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59205","cve":"CVE-2025-59205","title":"Windows Graphics Component Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59205","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59205","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59205","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59205","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59205","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59205 cve-2025-59205 windows graphics component elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59206","cve":"CVE-2025-59206","title":"Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59206","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59206","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59206","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.4,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59206","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59206","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59206 cve-2025-59206 windows resilient file system (refs) deduplication service elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59207","cve":"CVE-2025-59207","title":"Windows Kernel Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59207","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59207","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59207","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59207","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59207","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59207 cve-2025-59207 windows kernel elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59208","cve":"CVE-2025-59208","title":"Windows MapUrlToZone Information Disclosure Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59208","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59208","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59208","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59208","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59208","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59208 cve-2025-59208 windows mapurltozone information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59209","cve":"CVE-2025-59209","title":"Windows Push Notification Information Disclosure Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59209","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59209","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59209","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59209","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59209","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-59209 cve-2025-59209 windows push notification information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59210","cve":"CVE-2025-59210","title":"Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59210","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59210","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59210","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.4,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59210","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59210","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59210 cve-2025-59210 windows resilient file system (refs) deduplication service elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59211","cve":"CVE-2025-59211","title":"Windows Push Notification Information Disclosure Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59211","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59211","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59211","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59211","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59211","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-59211 cve-2025-59211 windows push notification information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59213","cve":"CVE-2025-59213","title":"Configuration Manager Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59213","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59213","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59213","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59213","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59213","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59213 cve-2025-59213 configuration manager elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59214","cve":"CVE-2025-59214","title":"Microsoft Windows File Explorer Spoofing Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59214","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59214","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59214","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59214","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59214","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-59214 cve-2025-59214 microsoft windows file explorer spoofing vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59218","cve":"CVE-2025-59218","title":"Azure Entra ID Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59218","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59218","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59218","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.6,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59218","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59218","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2025-59218 cve-2025-59218 azure entra id elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59221","cve":"CVE-2025-59221","title":"Microsoft Word Remote Code Execution Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59221","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59221","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59221","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59221","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59221","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59221 cve-2025-59221 microsoft word remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59222","cve":"CVE-2025-59222","title":"Microsoft Word Remote Code Execution Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59222","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59222","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59222","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59222","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59222","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59222 cve-2025-59222 microsoft word remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59223","cve":"CVE-2025-59223","title":"Microsoft Excel Remote Code Execution Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59223","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59223","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59223","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59223","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59223","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59223 cve-2025-59223 microsoft excel remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59224","cve":"CVE-2025-59224","title":"Microsoft Excel Remote Code Execution Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59224","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59224","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59224","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59224","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59224","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59224 cve-2025-59224 microsoft excel remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59225","cve":"CVE-2025-59225","title":"Microsoft Excel Remote Code Execution Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59225","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59225","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59225","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59225","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59225","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59225 cve-2025-59225 microsoft excel remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59226","cve":"CVE-2025-59226","title":"Microsoft Office Visio Remote Code Execution Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59226","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59226","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59226","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59226","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59226","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59226 cve-2025-59226 microsoft office visio remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59227","cve":"CVE-2025-59227","title":"Microsoft Office Remote Code Execution Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59227","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59227","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59227","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59227","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59227","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59227 cve-2025-59227 microsoft office remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59228","cve":"CVE-2025-59228","title":"Microsoft SharePoint Remote Code Execution Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59228","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59228","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59228","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59228","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59228","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59228 cve-2025-59228 microsoft sharepoint remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59229","cve":"CVE-2025-59229","title":"Microsoft Office Denial of Service Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59229","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59229","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59229","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59229","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59229","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-59229 cve-2025-59229 microsoft office denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59230","cve":"CVE-2025-59230","title":"Windows Remote Access Connection Manager Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59230","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59230","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59230","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59230","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59230","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59230 cve-2025-59230 windows remote access connection manager elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59231","cve":"CVE-2025-59231","title":"Microsoft Excel Remote Code Execution Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59231","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59231","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59231","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59231","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59231","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59231 cve-2025-59231 microsoft excel remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59232","cve":"CVE-2025-59232","title":"Microsoft Excel Information Disclosure Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59232","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59232","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59232","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59232","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59232","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59232 cve-2025-59232 microsoft excel information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59233","cve":"CVE-2025-59233","title":"Microsoft Excel Remote Code Execution Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59233","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59233","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59233","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59233","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59233","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59233 cve-2025-59233 microsoft excel remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59234","cve":"CVE-2025-59234","title":"Microsoft Office Remote Code Execution Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59234","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59234","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59234","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59234","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59234","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59234 cve-2025-59234 microsoft office remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59235","cve":"CVE-2025-59235","title":"Microsoft Excel Information Disclosure Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59235","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59235","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59235","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.1,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59235","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59235","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59235 cve-2025-59235 microsoft excel information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59236","cve":"CVE-2025-59236","title":"Microsoft Excel Remote Code Execution Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59236","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59236","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59236","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.4,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59236","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59236","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59236 cve-2025-59236 microsoft excel remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59237","cve":"CVE-2025-59237","title":"Microsoft SharePoint Remote Code Execution Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59237","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59237","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59237","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59237","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59237","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59237 cve-2025-59237 microsoft sharepoint remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59238","cve":"CVE-2025-59238","title":"Microsoft PowerPoint Remote Code Execution Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59238","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59238","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59238","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59238","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59238","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59238 cve-2025-59238 microsoft powerpoint remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59241","cve":"CVE-2025-59241","title":"Windows Health and Optimized Experiences Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59241","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59241","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59241","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59241","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59241","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59241 cve-2025-59241 windows health and optimized experiences elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59242","cve":"CVE-2025-59242","title":"Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59242","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59242","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59242","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59242","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59242","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59242 cve-2025-59242 windows ancillary function driver for winsock elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59243","cve":"CVE-2025-59243","title":"Microsoft Excel Remote Code Execution Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59243","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59243","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59243","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59243","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59243","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59243 cve-2025-59243 microsoft excel remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59244","cve":"CVE-2025-59244","title":"NTLM Hash Disclosure Spoofing Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59244","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59244","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59244","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59244","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59244","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-59244 cve-2025-59244 ntlm hash disclosure spoofing vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59246","cve":"CVE-2025-59246","title":"Azure Entra ID Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59246","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59246","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59246","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59246","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59246","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2025-59246 cve-2025-59246 azure entra id elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59247","cve":"CVE-2025-59247","title":"Azure PlayFab Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59247","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59247","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59247","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59247","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59247","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59247 cve-2025-59247 azure playfab elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59248","cve":"CVE-2025-59248","title":"Microsoft Exchange Server Spoofing Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59248","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59248","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59248","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59248","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59248","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59248 cve-2025-59248 microsoft exchange server spoofing vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59249","cve":"CVE-2025-59249","title":"Microsoft Exchange Server Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59249","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59249","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59249","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59249","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59249","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59249 cve-2025-59249 microsoft exchange server elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59250","cve":"CVE-2025-59250","title":"JDBC Driver for SQL Server Spoofing Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59250","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59250","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59250","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.1,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59250","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59250","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59250 cve-2025-59250 jdbc driver for sql server spoofing vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59252","cve":"CVE-2025-59252","title":"M365 Copilot Information Disclosure Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59252","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59252","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59252","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.3,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59252","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59252","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2025-59252 cve-2025-59252 m365 copilot information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59253","cve":"CVE-2025-59253","title":"Windows Search Service Denial of Service Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59253","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59253","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59253","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59253","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59253","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-59253 cve-2025-59253 windows search service denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59254","cve":"CVE-2025-59254","title":"Microsoft DWM Core Library Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59254","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59254","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59254","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59254","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59254","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59254 cve-2025-59254 microsoft dwm core library elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59255","cve":"CVE-2025-59255","title":"Windows DWM Core Library Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59255","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59255","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59255","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59255","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59255","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59255 cve-2025-59255 windows dwm core library elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59257","cve":"CVE-2025-59257","title":"Windows Local Session Manager (LSM) Denial of Service Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59257","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59257","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59257","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59257","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59257","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-59257 cve-2025-59257 windows local session manager (lsm) denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59258","cve":"CVE-2025-59258","title":"Windows Active Directory Federation Services (ADFS) Information Disclosure Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59258","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59258","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59258","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.2,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59258","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59258","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-59258 cve-2025-59258 windows active directory federation services (adfs) information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59259","cve":"CVE-2025-59259","title":"Windows Local Session Manager (LSM) Denial of Service Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59259","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59259","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59259","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59259","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59259","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-59259 cve-2025-59259 windows local session manager (lsm) denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59260","cve":"CVE-2025-59260","title":"Microsoft Failover Cluster Virtual Driver Information Disclosure Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59260","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59260","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59260","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59260","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59260","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-59260 cve-2025-59260 microsoft failover cluster virtual driver information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59261","cve":"CVE-2025-59261","title":"Windows Graphics Component Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59261","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59261","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59261","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59261","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59261","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59261 cve-2025-59261 windows graphics component elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59271","cve":"CVE-2025-59271","title":"Redis Enterprise Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59271","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59271","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59271","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.7,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59271","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59271","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59271 cve-2025-59271 redis enterprise elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59272","cve":"CVE-2025-59272","title":"Copilot Information Disclosure Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59272","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59272","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59272","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.3,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59272","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59272","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2025-59272 cve-2025-59272 copilot information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59273","cve":"CVE-2025-59273","title":"Azure Event Grid System Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59273","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59273","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59273","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.3,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59273","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59273","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59273 cve-2025-59273 azure event grid system elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59275","cve":"CVE-2025-59275","title":"Windows Authentication Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59275","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59275","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59275","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59275","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59275","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59275 cve-2025-59275 windows authentication elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59277","cve":"CVE-2025-59277","title":"Windows Authentication Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59277","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59277","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59277","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59277","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59277","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59277 cve-2025-59277 windows authentication elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59278","cve":"CVE-2025-59278","title":"Windows Authentication Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59278","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59278","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59278","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59278","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59278","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59278 cve-2025-59278 windows authentication elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59280","cve":"CVE-2025-59280","title":"Windows SMB Client Tampering Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59280","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59280","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59280","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":3.1,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59280","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59280","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-59280 cve-2025-59280 windows smb client tampering vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59281","cve":"CVE-2025-59281","title":"Xbox Gaming Services Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59281","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59281","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59281","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59281","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59281","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59281 cve-2025-59281 xbox gaming services elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59282","cve":"CVE-2025-59282","title":"Internet Information Services (IIS) Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59282","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59282","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59282","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59282","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59282","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59282 cve-2025-59282 internet information services (iis) inbox com objects (global memory) remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59284","cve":"CVE-2025-59284","title":"Windows NTLM Spoofing Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59284","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59284","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59284","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":3.3,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59284","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59284","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-59284 cve-2025-59284 windows ntlm spoofing vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59285","cve":"CVE-2025-59285","title":"Azure Monitor Agent Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59285","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59285","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59285","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59285","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59285","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59285 cve-2025-59285 azure monitor agent elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59286","cve":"CVE-2025-59286","title":"Copilot Information Disclosure Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59286","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59286","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59286","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.3,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59286","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59286","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2025-59286 cve-2025-59286 copilot information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59287","cve":"CVE-2025-59287","title":"Windows Server Update Service (WSUS) Remote Code Execution Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":9.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2025-59287 cve-2025-59287 windows server update service (wsus) remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59288","cve":"CVE-2025-59288","title":"Playwright Spoofing Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59288","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59288","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59288","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.3,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59288","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59288","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-59288 cve-2025-59288 playwright spoofing vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59289","cve":"CVE-2025-59289","title":"Windows Bluetooth Service Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59289","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59289","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59289","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59289","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59289","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59289 cve-2025-59289 windows bluetooth service elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59290","cve":"CVE-2025-59290","title":"Windows Bluetooth Service Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59290","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59290","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59290","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59290","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59290","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59290 cve-2025-59290 windows bluetooth service elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59291","cve":"CVE-2025-59291","title":"Confidential Azure Container Instances Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59291","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59291","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59291","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.2,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59291","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59291","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59291 cve-2025-59291 confidential azure container instances elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59292","cve":"CVE-2025-59292","title":"Azure Compute Gallery Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59292","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59292","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59292","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.2,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59292","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59292","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59292 cve-2025-59292 azure compute gallery elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59294","cve":"CVE-2025-59294","title":"Windows Taskbar Live Preview Information Disclosure Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59294","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59294","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59294","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":2.1,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59294","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59294","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-59294 cve-2025-59294 windows taskbar live preview information disclosure vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59295","cve":"CVE-2025-59295","title":"Windows URL Parsing Remote Code Execution Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59295","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59295","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59295","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59295","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59295","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59295 cve-2025-59295 windows url parsing remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59489","cve":"CVE-2025-59489","title":"MITRE: CVE-2025-59489 Unity Gaming Engine Editor vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59489","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59489","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59489","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.4,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59489","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59489","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59489 cve-2025-59489 mitre: cve-2025-59489 unity gaming engine editor vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59494","cve":"CVE-2025-59494","title":"Azure Monitor Agent Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59494","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59494","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59494","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59494","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59494","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59494 cve-2025-59494 azure monitor agent elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59497","cve":"CVE-2025-59497","title":"Microsoft Defender for Linux Denial of Service Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59497","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59497","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59497","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59497","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59497","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59497 cve-2025-59497 microsoft defender for linux denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59500","cve":"CVE-2025-59500","title":"Azure Notification Service Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59500","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59500","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59500","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.7,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59500","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59500","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59500 cve-2025-59500 azure notification service elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59501","cve":"CVE-2025-59501","title":"Microsoft Configuration Manager Spoofing Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59501","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59501","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59501","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.8,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59501","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59501","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-59501 cve-2025-59501 microsoft configuration manager spoofing vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59502","cve":"CVE-2025-59502","title":"Remote Procedure Call Denial of Service Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59502","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59502","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59502","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59502","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59502","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-59502 cve-2025-59502 remote procedure call denial of service vulnerability microsoft msrc msrc"},{"id":"CVE-2025-59503","cve":"CVE-2025-59503","title":"Azure Compute Resource Provider Elevation of Privilege Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59503","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59503","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59503","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"critical","cvss":10,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59503","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59503","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"critical","vendor_slug":"microsoft","search_text":"cve-2025-59503 cve-2025-59503 azure compute resource provider elevation of privilege vulnerability microsoft msrc msrc"},{"id":"CVE-2025-6020","cve":"CVE-2025-6020","title":"Linux-pam: linux-pam directory traversal","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6020","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6020","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6020","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.8,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6020","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6020","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-6020 cve-2025-6020 linux-pam: linux-pam directory traversal microsoft msrc msrc"},{"id":"CVE-2025-6021","cve":"CVE-2025-6021","title":"Libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml2","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6021","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6021","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6021","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6021","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6021","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-6021 cve-2025-6021 libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml2 microsoft msrc msrc"},{"id":"CVE-2025-6032","cve":"CVE-2025-6032","title":"Podman: podman missing tls verification","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6032","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6032","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6032","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":8.3,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6032","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6032","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-6032 cve-2025-6032 podman: podman missing tls verification microsoft msrc msrc"},{"id":"CVE-2025-6052","cve":"CVE-2025-6052","title":"Glib: integer overflow in g_string_maybe_expand() leading to potential buffer overflow in glib gstring","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6052","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6052","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6052","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":3.7,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6052","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6052","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-6052 cve-2025-6052 glib: integer overflow in g_string_maybe_expand() leading to potential buffer overflow in glib gstring microsoft msrc msrc"},{"id":"CVE-2025-6069","cve":"CVE-2025-6069","title":"HTMLParser quadratic complexity when processing malformed inputs","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6069","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6069","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6069","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":4.3,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6069","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6069","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-6069 cve-2025-6069 htmlparser quadratic complexity when processing malformed inputs microsoft msrc msrc"},{"id":"CVE-2025-60711","cve":"CVE-2025-60711","title":"Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60711","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60711","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60711","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.3,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60711","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60711","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-60711 cve-2025-60711 microsoft edge (chromium-based) remote code execution vulnerability microsoft msrc msrc"},{"id":"CVE-2025-61099","cve":"CVE-2025-61099","title":"FRRouting/frr from v2.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the opaque_info_detail function at ospf_opaque.c. This vulnerability allows attacke","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61099","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61099","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61099","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61099","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61099","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-61099 cve-2025-61099 frrouting/frr from v2.0 through v10.4.1 was discovered to contain a null pointer dereference via the opaque_info_detail function at ospf_opaque.c. this vulnerability allows attacke microsoft msrc msrc"},{"id":"CVE-2025-61101","cve":"CVE-2025-61101","title":"FRRouting/frr from v4.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the show_vty_ext_link_rmt_itf_addr function at ospf_ext.c. This vulnerability allow","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61101","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61101","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61101","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61101","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61101","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-61101 cve-2025-61101 frrouting/frr from v4.0 through v10.4.1 was discovered to contain a null pointer dereference via the show_vty_ext_link_rmt_itf_addr function at ospf_ext.c. this vulnerability allow microsoft msrc msrc"},{"id":"CVE-2025-61104","cve":"CVE-2025-61104","title":"FRRouting/frr from v4.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the show_vty_unknown_tlv function at ospf_ext.c. This vulnerability allows attacker","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61104","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61104","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61104","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61104","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61104","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-61104 cve-2025-61104 frrouting/frr from v4.0 through v10.4.1 was discovered to contain a null pointer dereference via the show_vty_unknown_tlv function at ospf_ext.c. this vulnerability allows attacker microsoft msrc msrc"},{"id":"CVE-2025-61105","cve":"CVE-2025-61105","title":"FRRouting/frr from v4.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the show_vty_link_info function at ospf_ext.c. This vulnerability allows attackers","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61105","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61105","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61105","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61105","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61105","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-61105 cve-2025-61105 frrouting/frr from v4.0 through v10.4.1 was discovered to contain a null pointer dereference via the show_vty_link_info function at ospf_ext.c. this vulnerability allows attackers microsoft msrc msrc"},{"id":"CVE-2025-61106","cve":"CVE-2025-61106","title":"FRRouting/frr from v4.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the show_vty_ext_pref_pref_sid function at ospf_ext.c. This vulnerability allows at","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61106","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61106","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61106","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61106","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61106","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-61106 cve-2025-61106 frrouting/frr from v4.0 through v10.4.1 was discovered to contain a null pointer dereference via the show_vty_ext_pref_pref_sid function at ospf_ext.c. this vulnerability allows at microsoft msrc msrc"},{"id":"CVE-2025-6140","cve":"CVE-2025-6140","title":"spdlog pattern_formatter-inl.h scoped_padder resource consumption","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6140","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6140","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6140","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":3.3,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6140","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6140","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-6140 cve-2025-6140 spdlog pattern_formatter-inl.h scoped_padder resource consumption microsoft msrc msrc"},{"id":"CVE-2025-6141","cve":"CVE-2025-6141","title":"GNU ncurses parse_entry.c postprocess_termcap stack-based overflow","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6141","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6141","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6141","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":3.3,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6141","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6141","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-6141 cve-2025-6141 gnu ncurses parse_entry.c postprocess_termcap stack-based overflow microsoft msrc msrc"},{"id":"CVE-2025-6170","cve":"CVE-2025-6170","title":"Libxml2: stack buffer overflow in xmllint interactive shell command handling","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6170","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6170","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6170","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":2.5,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6170","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6170","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-6170 cve-2025-6170 libxml2: stack buffer overflow in xmllint interactive shell command handling microsoft msrc msrc"},{"id":"CVE-2025-61723","cve":"CVE-2025-61723","title":"Quadratic complexity when parsing some invalid inputs in encoding/pem","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61723","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61723","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61723","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61723","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61723","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-61723 cve-2025-61723 quadratic complexity when parsing some invalid inputs in encoding/pem microsoft msrc msrc"},{"id":"CVE-2025-61724","cve":"CVE-2025-61724","title":"Excessive CPU consumption in Reader.ReadResponse in net/textproto","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61724","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61724","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61724","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61724","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61724","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-61724 cve-2025-61724 excessive cpu consumption in reader.readresponse in net/textproto microsoft msrc msrc"},{"id":"CVE-2025-61725","cve":"CVE-2025-61725","title":"Excessive CPU consumption in ParseAddress in net/mail","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61725","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61725","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61725","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":6.5,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61725","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61725","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-61725 cve-2025-61725 excessive cpu consumption in parseaddress in net/mail microsoft msrc msrc"},{"id":"CVE-2025-6199","cve":"CVE-2025-6199","title":"Gdk-pixbuf: uninitialized memory disclosure in gdkpixbuf gif lzw decoder","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6199","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6199","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6199","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":3.3,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6199","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6199","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-6199 cve-2025-6199 gdk-pixbuf: uninitialized memory disclosure in gdkpixbuf gif lzw decoder microsoft msrc msrc"},{"id":"CVE-2025-62230","cve":"CVE-2025-62230","title":"Xorg: xwayland: use-after-free in xkb client resource removal","source_published":"2025-10-14","source_updated":"2026-03-31","source_doc_published":"2025-10-14","source_doc_updated":"2026-03-31","published":"2025-10-14","date":"2025-10-14","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62230","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62230","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62230","published":"2025-10-14","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"high","cvss":7.3,"cve_published":null,"cve_updated":null,"published_at":"2025-10-14","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62230","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62230","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-10-14","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"high","vendor_slug":"microsoft","search_text":"cve-2025-62230 cve-2025-62230 xorg: xwayland: use-after-free in xkb client resource removal microsoft msrc msrc"},{"id":"CVE-2025-6269","cve":"CVE-2025-6269","title":"HDF5 H5Cimage.c H5C__reconstruct_cache_entry heap-based overflow","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6269","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6269","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6269","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.3,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6269","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6269","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-6269 cve-2025-6269 hdf5 h5cimage.c h5c__reconstruct_cache_entry heap-based overflow microsoft msrc msrc"},{"id":"CVE-2025-6270","cve":"CVE-2025-6270","title":"HDF5 H5FSsection.c H5FS__sect_find_node heap-based overflow","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6270","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6270","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6270","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.3,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6270","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6270","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-6270 cve-2025-6270 hdf5 h5fssection.c h5fs__sect_find_node heap-based overflow microsoft msrc msrc"},{"id":"CVE-2025-6497","cve":"CVE-2025-6497","title":"HTACG tidy-html5 parser.c prvTidyParseNamespace assertion","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6497","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6497","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6497","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":3.3,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6497","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6497","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-6497 cve-2025-6497 htacg tidy-html5 parser.c prvtidyparsenamespace assertion microsoft msrc msrc"},{"id":"CVE-2025-6498","cve":"CVE-2025-6498","title":"HTACG tidy-html5 alloc.c defaultAlloc memory leak","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6498","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6498","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6498","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":3.3,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6498","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6498","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-6498 cve-2025-6498 htacg tidy-html5 alloc.c defaultalloc memory leak microsoft msrc msrc"},{"id":"CVE-2025-6516","cve":"CVE-2025-6516","title":"HDF5 H5Fint.c H5F_addr_decode_len heap-based overflow","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6516","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6516","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6516","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"medium","cvss":5.3,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6516","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6516","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"medium","vendor_slug":"microsoft","search_text":"cve-2025-6516 cve-2025-6516 hdf5 h5fint.c h5f_addr_decode_len heap-based overflow microsoft msrc msrc"},{"id":"CVE-2025-6750","cve":"CVE-2025-6750","title":"HDF5 H5Omtime.c H5O__mtime_new_encode heap-based overflow","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6750","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6750","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6750","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":3.3,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6750","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6750","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-6750 cve-2025-6750 hdf5 h5omtime.c h5o__mtime_new_encode heap-based overflow microsoft msrc msrc"},{"id":"CVE-2025-6816","cve":"CVE-2025-6816","title":"HDF5 H5Ofsinfo.c H5O__fsinfo_encode heap-based overflow","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6816","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6816","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6816","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":3.3,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6816","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6816","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-6816 cve-2025-6816 hdf5 h5ofsinfo.c h5o__fsinfo_encode heap-based overflow microsoft msrc msrc"},{"id":"CVE-2025-6817","cve":"CVE-2025-6817","title":"HDF5 H5Centry.c H5C__load_entry resource consumption","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6817","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6817","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6817","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":3.3,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6817","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6817","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-6817 cve-2025-6817 hdf5 h5centry.c h5c__load_entry resource consumption microsoft msrc msrc"},{"id":"CVE-2025-6818","cve":"CVE-2025-6818","title":"HDF5 H5Ochunk.c H5O__chunk_protect heap-based overflow","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6818","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6818","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6818","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":3.3,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6818","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6818","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-6818 cve-2025-6818 hdf5 h5ochunk.c h5o__chunk_protect heap-based overflow microsoft msrc msrc"},{"id":"CVE-2025-6856","cve":"CVE-2025-6856","title":"HDF5 H5FL.c H5FL__reg_gc_list use after free","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6856","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6856","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6856","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":3.3,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6856","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6856","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-6856 cve-2025-6856 hdf5 h5fl.c h5fl__reg_gc_list use after free microsoft msrc msrc"},{"id":"CVE-2025-6857","cve":"CVE-2025-6857","title":"HDF5 H5Gnode.c H5G__node_cmp3 stack-based overflow","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6857","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6857","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6857","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":3.3,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6857","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6857","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-6857 cve-2025-6857 hdf5 h5gnode.c h5g__node_cmp3 stack-based overflow microsoft msrc msrc"},{"id":"CVE-2025-6858","cve":"CVE-2025-6858","title":"HDF5 H5Centry.c H5C__flush_single_entry null pointer dereference","source_published":"2025-06-10","source_updated":"2026-03-31","source_doc_published":"2025-06-10","source_doc_updated":"2026-03-31","published":"2025-06-10","date":"2025-06-10","updated":"2026-03-31","date_basis":"vendor","vendor":"Microsoft","product":"","source":"MSRC","source_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6858","msrc_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6858","candidates":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6858","published":"2025-06-10","updated":"2026-03-31","checked_at":null,"status_ok":null,"source_kind":"vendor","confidence":0.9}],"exploited":false,"severity":"low","cvss":3.3,"cve_published":null,"cve_updated":null,"published_at":"2025-06-10","updated_at":"2026-03-31","link_checked_at":null,"sourceUrl":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6858","added":"2026-02-21T13:35:53.102Z","public_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6858","public_source":"MSRC","public_source_slug":"msrc","public_published":"2025-06-10","public_updated":"2026-03-31","public_display_date":"2026-03-31","public_sort_date":"2026-03-31","public_period_date":"2026-03-31","severity_norm":"low","vendor_slug":"microsoft","search_text":"cve-2025-6858 cve-2025-6858 hdf5 h5centry.c h5c__flush_single_entry null pointer dereference microsoft msrc msrc"},{"id":"BSI:WID-SEC-2024-1703","cve":"","title":"docker: Schwachstelle ermöglicht Privilegieneskalation","date":"2026-03-30","published":"2026-03-30","updated":null,"source_published":"2026-03-30","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1703","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1703","published":"2026-03-30","updated":"2026-03-30","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-03-31T00:00:40.880Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1703","added":"2026-03-30T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1703","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-30","public_updated":null,"public_display_date":"2026-03-30","public_sort_date":"2026-03-30","public_period_date":"2026-03-30","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2024-1703 docker: schwachstelle ermöglicht privilegieneskalation bsi bsi"},{"id":"BSI:WID-SEC-2024-1722","cve":"","title":"Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff","date":"2026-03-30","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1722","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-03-31T00:00:40.880Z","published":"2026-03-30","source_published":"2026-03-30","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1722","published":"2026-03-30","updated":"2026-03-30","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1722","added":"2026-03-30T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1722","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-30","public_updated":null,"public_display_date":"2026-03-30","public_sort_date":"2026-03-30","public_period_date":"2026-03-30","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2024-1722 linux kernel: mehrere schwachstellen ermöglichen nicht spezifizierten angriff bsi bsi"},{"id":"BSI:WID-SEC-2024-3367","cve":"","title":"Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-03-30","published":"2026-03-30","updated":null,"source_published":"2026-03-30","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3367","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3367","published":"2026-03-30","updated":"2026-03-30","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-03-31T00:00:40.880Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3367","added":"2026-03-30T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3367","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-30","public_updated":null,"public_display_date":"2026-03-30","public_sort_date":"2026-03-30","public_period_date":"2026-03-30","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2024-3367 linux kernel: mehrere schwachstellen ermöglichen denial of service bsi bsi"},{"id":"BSI:WID-SEC-2024-3368","cve":"","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-03-30","published":"2026-03-30","updated":null,"source_published":"2026-03-30","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3368","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3368","published":"2026-03-30","updated":"2026-03-30","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-03-31T00:00:40.880Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3368","added":"2026-03-30T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3368","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-30","public_updated":null,"public_display_date":"2026-03-30","public_sort_date":"2026-03-30","public_period_date":"2026-03-30","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2024-3368 linux kernel: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0054","cve":"","title":"Red Hat JBoss Enterprise Application Platform (Undertow): Mehrere Schwachstellen","date":"2026-03-30","published":"2026-03-30","updated":null,"source_published":"2026-03-30","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0054","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-03-31T00:00:40.880Z","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0054","published":"2026-03-30","updated":"2026-03-30","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0054","added":"2026-03-30T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0054","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-30","public_updated":null,"public_display_date":"2026-03-30","public_sort_date":"2026-03-30","public_period_date":"2026-03-30","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0054 red hat jboss enterprise application platform (undertow): mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0207","cve":"","title":"Red Hat Enterprise Linux (urllib3): Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-03-30","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0207","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-03-31T00:00:40.880Z","published":"2026-03-30","source_published":"2026-03-30","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0207","published":"2026-03-30","updated":"2026-03-30","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0207","added":"2026-03-30T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0207","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-30","public_updated":null,"public_display_date":"2026-03-30","public_sort_date":"2026-03-30","public_period_date":"2026-03-30","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0207 red hat enterprise linux (urllib3): mehrere schwachstellen ermöglichen denial of service bsi bsi"},{"id":"BSI:WID-SEC-2026-0280","cve":"","title":"Linux Kernel: Mehrere Schwachstellen","date":"2026-03-30","published":"2026-03-30","updated":null,"source_published":"2026-03-30","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0280","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0280","published":"2026-03-30","updated":"2026-03-30","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-03-31T00:00:40.880Z","source_doc_published":"2026-03-25","source_doc_updated":"2026-03-25","cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0280","added":"2026-03-30T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0280","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-30","public_updated":null,"public_display_date":"2026-03-30","public_sort_date":"2026-03-30","public_period_date":"2026-03-30","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0280 linux kernel: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0362","cve":"","title":"Red Hat Enterprise Linux (Lodash): Schwachstelle ermöglicht Denial of Service","date":"2026-03-30","updated":null,"vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0362","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"fastlane_seen_at":"2026-03-31T00:00:40.880Z","published":"2026-03-30","source_published":"2026-03-30","source_updated":null,"date_basis":"bsi_portal","candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0362","published":"2026-03-30","updated":"2026-03-30","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0362","added":"2026-03-30T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0362","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-30","public_updated":null,"public_display_date":"2026-03-30","public_sort_date":"2026-03-30","public_period_date":"2026-03-30","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0362 red hat enterprise linux (lodash): schwachstelle ermöglicht denial of service bsi bsi"},{"id":"BSI:WID-SEC-2026-0664","cve":"","title":"Adobe Creative Cloud Applikationen: Mehrere Schwachstellen","date":"2026-03-30","published":"2026-03-30","updated":null,"source_published":"2026-03-30","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0664","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0664","published":"2026-03-30","updated":"2026-03-30","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-03-31T00:00:40.880Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0664","added":"2026-03-30T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0664","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-30","public_updated":null,"public_display_date":"2026-03-30","public_sort_date":"2026-03-30","public_period_date":"2026-03-30","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0664 adobe creative cloud applikationen: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0836","cve":"","title":"Citrix Systems NetScaler: Mehrere Schwachstellen","date":"2026-03-30","published":"2026-03-30","updated":null,"source_published":"2026-03-30","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0836","severity":"critical","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0836","published":"2026-03-30","updated":"2026-03-30","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-03-30T09:00:35.782Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0836","added":"2026-03-30T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0836","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-30","public_updated":null,"public_display_date":"2026-03-30","public_sort_date":"2026-03-30","public_period_date":"2026-03-30","severity_norm":"critical","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0836 citrix systems netscaler: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0899","cve":"","title":"Grafana: Mehrere Schwachstellen","date":"2026-03-30","published":"2026-03-30","updated":null,"source_published":"2026-03-30","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0899","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0899","published":"2026-03-30","updated":"2026-03-30","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-03-31T00:00:40.880Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0899","added":"2026-03-30T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0899","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-30","public_updated":null,"public_display_date":"2026-03-30","public_sort_date":"2026-03-30","public_period_date":"2026-03-30","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0899 grafana: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0900","cve":"","title":"Langflow: Mehrere Schwachstellen","date":"2026-03-30","published":"2026-03-30","updated":null,"source_published":"2026-03-30","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0900","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0900","published":"2026-03-30","updated":"2026-03-30","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-03-31T00:00:40.880Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0900","added":"2026-03-30T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0900","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-30","public_updated":null,"public_display_date":"2026-03-30","public_sort_date":"2026-03-30","public_period_date":"2026-03-30","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0900 langflow: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0901","cve":"","title":"Perl: Schwachstelle ermöglicht nicht spezifizierten Angriff","date":"2026-03-30","published":"2026-03-30","updated":null,"source_published":"2026-03-30","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0901","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0901","published":"2026-03-30","updated":"2026-03-30","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-03-31T00:00:40.880Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0901","added":"2026-03-30T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0901","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-30","public_updated":null,"public_display_date":"2026-03-30","public_sort_date":"2026-03-30","public_period_date":"2026-03-30","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0901 perl: schwachstelle ermöglicht nicht spezifizierten angriff bsi bsi"},{"id":"BSI:WID-SEC-2026-0902","cve":"","title":"Fleet: Mehrere Schwachstellen","date":"2026-03-30","published":"2026-03-30","updated":null,"source_published":"2026-03-30","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0902","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0902","published":"2026-03-30","updated":"2026-03-30","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-03-31T00:00:40.880Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0902","added":"2026-03-30T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0902","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-30","public_updated":null,"public_display_date":"2026-03-30","public_sort_date":"2026-03-30","public_period_date":"2026-03-30","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0902 fleet: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0905","cve":"","title":"Microsoft Edge: Schwachstelle ermöglicht Manipulation von Dateien und die Offenlegung von Informationen","date":"2026-03-30","published":"2026-03-30","updated":null,"source_published":"2026-03-30","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0905","severity":"low","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0905","published":"2026-03-30","updated":"2026-03-30","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-03-31T00:00:40.880Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0905","added":"2026-03-30T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0905","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-30","public_updated":null,"public_display_date":"2026-03-30","public_sort_date":"2026-03-30","public_period_date":"2026-03-30","severity_norm":"low","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0905 microsoft edge: schwachstelle ermöglicht manipulation von dateien und die offenlegung von informationen bsi bsi"},{"id":"BSI:WID-SEC-2026-0907","cve":"","title":"Red Hat Undertow: Mehrere Schwachstellen ermöglichen Umgehung von Sicherheitsmaßnahmen","date":"2026-03-30","published":"2026-03-30","updated":null,"source_published":"2026-03-30","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0907","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0907","published":"2026-03-30","updated":"2026-03-30","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-03-31T00:00:40.880Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0907","added":"2026-03-30T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0907","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-30","public_updated":null,"public_display_date":"2026-03-30","public_sort_date":"2026-03-30","public_period_date":"2026-03-30","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0907 red hat undertow: mehrere schwachstellen ermöglichen umgehung von sicherheitsmaßnahmen bsi bsi"},{"id":"BSI:WID-SEC-2026-0908","cve":"","title":"Wazuh: Mehrere Schwachstellen","date":"2026-03-30","published":"2026-03-30","updated":null,"source_published":"2026-03-30","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0908","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0908","published":"2026-03-30","updated":"2026-03-30","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-03-31T00:00:40.880Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0908","added":"2026-03-30T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0908","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-30","public_updated":null,"public_display_date":"2026-03-30","public_sort_date":"2026-03-30","public_period_date":"2026-03-30","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0908 wazuh: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0910","cve":"","title":"Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service","date":"2026-03-30","published":"2026-03-30","updated":null,"source_published":"2026-03-30","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0910","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0910","published":"2026-03-30","updated":"2026-03-30","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-03-31T00:00:40.880Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0910","added":"2026-03-30T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0910","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-30","public_updated":null,"public_display_date":"2026-03-30","public_sort_date":"2026-03-30","public_period_date":"2026-03-30","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0910 linux kernel: mehrere schwachstellen ermöglichen denial of service bsi bsi"},{"id":"BSI:WID-SEC-2026-0911","cve":"","title":"WebKitGTK: Mehrere Schwachstellen","date":"2026-03-30","published":"2026-03-30","updated":null,"source_published":"2026-03-30","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0911","severity":"medium","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0911","published":"2026-03-30","updated":"2026-03-30","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-03-31T00:00:40.880Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0911","added":"2026-03-30T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0911","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-30","public_updated":null,"public_display_date":"2026-03-30","public_sort_date":"2026-03-30","public_period_date":"2026-03-30","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0911 webkitgtk: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-2026-0912","cve":"","title":"Foreman: Schwachstelle ermöglicht Codeausführung","date":"2026-03-30","published":"2026-03-30","updated":null,"source_published":"2026-03-30","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0912","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0912","published":"2026-03-30","updated":"2026-03-30","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-03-31T00:00:40.880Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0912","added":"2026-03-30T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0912","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-30","public_updated":null,"public_display_date":"2026-03-30","public_sort_date":"2026-03-30","public_period_date":"2026-03-30","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0912 foreman: schwachstelle ermöglicht codeausführung bsi bsi"},{"id":"BSI:WID-SEC-2026-0913","cve":"","title":"Red Hat FUSE (libfuse): Mehrere Schwachstellen ermöglichen Codeausführung und DoS","date":"2026-03-30","published":"2026-03-30","updated":null,"source_published":"2026-03-30","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0913","severity":"high","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0913","published":"2026-03-30","updated":"2026-03-30","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-03-31T00:00:40.880Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0913","added":"2026-03-30T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0913","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-30","public_updated":null,"public_display_date":"2026-03-30","public_sort_date":"2026-03-30","public_period_date":"2026-03-30","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0913 red hat fuse (libfuse): mehrere schwachstellen ermöglichen codeausführung und dos bsi bsi"},{"id":"BSI:WID-SEC-2026-0914","cve":"","title":"FRRouting Project FRRouting: Schwachstelle ermöglicht Manipulation von Daten","date":"2026-03-30","published":"2026-03-30","updated":null,"source_published":"2026-03-30","source_updated":null,"date_basis":"bsi_portal","vendor":"","product":"","source":"BSI","source_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0914","severity":"low","cvss":null,"exploited":false,"vex_status":"unknown","vex_keys":[],"candidates":[{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0914","published":"2026-03-30","updated":"2026-03-30","checked_at":null,"status_ok":null,"source_kind":"bsi_portal","confidence":0.99}],"fastlane_seen_at":"2026-03-31T00:00:40.880Z","source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0914","added":"2026-03-30T00:00:00.000Z","public_url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0914","public_source":"BSI","public_source_slug":"bsi","public_published":"2026-03-30","public_updated":null,"public_display_date":"2026-03-30","public_sort_date":"2026-03-30","public_period_date":"2026-03-30","severity_norm":"low","vendor_slug":null,"search_text":"bsi:wid-sec-2026-0914 frrouting project frrouting: schwachstelle ermöglicht manipulation von daten bsi bsi"},{"id":"BSI:WID-SEC-W-2024-0184","cve":"CVE-2023-44271","title":"Red Hat Enterprise Linux (pillow): Schwachstelle ermöglicht Denial of Service","date":"2024-01-23","published":"2024-01-23","updated":"2026-03-30","source_published":"2024-01-23","source_updated":"2026-03-30","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://access.redhat.com/errata/RHSA-2024:0345","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0184.json","summary":"WID-SEC-W-2024-0184 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0184","summary":"WID-SEC-2024-0184 - Portal Version","category":"self"},{"url":"https://access.redhat.com/errata/RHSA-2024:0345","summary":"RedHat Security Advisory vom 2024-01-23","category":"external"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2247820","summary":"RedHat Security Advisory vom 2024-01-23","category":"external"},{"url":"http://linux.oracle.com/errata/ELSA-2024-0345.html","summary":"Oracle Linux Security Advisory ELSA-2024-0345 vom 2024-01-25","category":"external"},{"url":"https://oss.oracle.com/pipermail/el-errata/2024-January/015181.html","summary":"Oracle Linux Security Advisory ELSA-2024-0345 vom 2024-01-25","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-2024-4ef97ebbfc","summary":"Fedora Security Advisory FEDORA-2024-4EF97EBBFC vom 2024-01-27","category":"external"},{"url":"https://lists.centos.org/pipermail/centos-announce/2024-January/099214.html","summary":"CentOS Security Advisory CESA-2024:0345 vom 2024-01-26","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS-2024-2508.html","summary":"Amazon Linux Security Advisory ALAS-2024-2508 vom 2024-04-01","category":"external"},{"url":"https://security.gentoo.org/glsa/202405-12","summary":"Gentoo Linux Security Advisory GLSA-202405-12 vom 2024-05-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:3005","summary":"Red Hat Security Advisory RHSA-2024:3005 vom 2024-05-22","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8135-1","summary":"Ubuntu Security Notice USN-8135-1 vom 2026-03-31","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://access.redhat.com/errata/RHSA-2024:0345","published":"2024-01-23","updated":"2026-03-30","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://access.redhat.com/errata/RHSA-2024:0345","added":"2026-02-06T02:45:43.356Z","public_url":"https://access.redhat.com/errata/RHSA-2024:0345","public_source":"Red Hat","public_source_slug":"red-hat","public_published":"2024-01-23","public_updated":"2026-03-30","public_display_date":"2026-03-30","public_sort_date":"2026-03-30","public_period_date":"2026-03-30","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-w-2024-0184 cve-2023-44271 red hat enterprise linux (pillow): schwachstelle ermöglicht denial of service red hat bsi"},{"id":"BSI:WID-SEC-W-2024-0337","cve":"CVE-2023-50447","title":"Red Hat Enterprise Linux (Pillow): Schwachstelle ermöglicht Codeausführung","date":"2024-02-08","published":"2024-02-08","updated":"2026-03-30","source_published":"2024-02-08","source_updated":"2026-03-30","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://access.redhat.com/errata/RHSA-2024:0754","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0337.json","summary":"WID-SEC-W-2024-0337 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0337","summary":"WID-SEC-2024-0337 - Portal Version","category":"self"},{"url":"https://access.redhat.com/errata/RHSA-2024:0754","summary":"Red Hat Security Advisory RHSA-2024:0754 vom 2024-02-08","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:0857","summary":"Red Hat Security Advisory RHSA-2024:0857 vom 2024-02-19","category":"external"},{"url":"http://linux.oracle.com/errata/ELSA-2024-0857.html","summary":"Oracle Linux Security Advisory ELSA-2024-0857 vom 2024-02-19","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:0893","summary":"Red Hat Security Advisory RHSA-2024:0893 vom 2024-02-20","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-0893.html","summary":"Oracle Linux Security Advisory ELSA-2024-0893 vom 2024-02-20","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:1058","summary":"Red Hat Security Advisory RHSA-2024:1058 vom 2024-02-29","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:1059","summary":"Red Hat Security Advisory RHSA-2024:1059 vom 2024-02-29","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:1060","summary":"Red Hat Security Advisory RHSA-2024:1060 vom 2024-02-29","category":"external"},{"url":"https://security.gentoo.org/glsa/202405-12","summary":"Gentoo Linux Security Advisory GLSA-202405-12 vom 2024-05-05","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/GYSVBJPZSCRQ4QL45BINOZYP7XXBBK3C/","summary":"openSUSE Security Update OPENSUSE-SU-2024:0125-1 vom 2024-05-13","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GYSVBJPZSCRQ4QL45BINOZYP7XXBBK3C/","summary":"openSUSE Security Update OPENSUSE-SU-2024:0125-1 vom 2024-05-13","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-8135-1","summary":"Ubuntu Security Notice USN-8135-1 vom 2026-03-31","category":"external"}],"severity":"high","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"https://access.redhat.com/errata/RHSA-2024:0754","published":"2024-02-08","updated":"2026-03-30","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"https://access.redhat.com/errata/RHSA-2024:0754","added":"2026-02-06T06:31:51.601Z","public_url":"https://access.redhat.com/errata/RHSA-2024:0754","public_source":"Red Hat","public_source_slug":"red-hat","public_published":"2024-02-08","public_updated":"2026-03-30","public_display_date":"2026-03-30","public_sort_date":"2026-03-30","public_period_date":"2026-03-30","severity_norm":"high","vendor_slug":null,"search_text":"bsi:wid-sec-w-2024-0337 cve-2023-50447 red hat enterprise linux (pillow): schwachstelle ermöglicht codeausführung red hat bsi"},{"id":"CVE:CVE-2026-3055","cve":"CVE-2026-3055","title":"Citrix NetScaler Out-of-Bounds Read Vulnerability","date":"2026-03-30","vendor":"Citrix","product":"NetScaler","source":"CISA-KEV","cisa_url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog","source_url":"https://nvd.nist.gov/vuln/detail/CVE-2026-3055","severity":"high","ransomware":"Unknown","cvss":null,"exploited":true,"published":"2026-03-30","updated":null,"source_published":"2026-03-30","source_updated":null,"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"candidates":[{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-3055","published":"2026-03-30","updated":"2026-03-30","checked_at":null,"status_ok":null,"source_kind":"nvd","confidence":0.8}],"date_basis":"nvd","link_checked_at":null,"sourceUrl":"https://nvd.nist.gov/vuln/detail/CVE-2026-3055","added":"2026-03-30T00:00:00.000Z","public_url":"https://nvd.nist.gov/vuln/detail/CVE-2026-3055","public_source":"CVE","public_source_slug":"cve","public_published":"2026-03-30","public_updated":null,"public_display_date":"2026-03-30","public_sort_date":"2026-03-30","public_period_date":"2026-03-30","severity_norm":"high","vendor_slug":"citrix","search_text":"cve:cve-2026-3055 cve-2026-3055 citrix netscaler out-of-bounds read vulnerability citrix netscaler cve cisa-kev unknown"},{"id":"BSI:WID-SEC-W-2024-0444","cve":"CVE-2023-52433","title":"Linux Kernel: Mehrere Schwachstellen","date":"2024-02-20","published":"2024-02-20","updated":"2026-03-29","source_published":"2024-02-20","source_updated":"2026-03-29","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"http://lore.kernel.org/linux-cve-announce/2024022009-subsoil-halt-4b28@gregkh/","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0444.json","summary":"WID-SEC-W-2024-0444 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0444","summary":"WID-SEC-2024-0444 - Portal Version","category":"self"},{"url":"http://lore.kernel.org/linux-cve-announce/2024022009-subsoil-halt-4b28@gregkh/","summary":"CVE Announce auf lore.kernel.org vom 2024-02-20","category":"external"},{"url":"http://lore.kernel.org/linux-cve-announce/2024022017-slit-wish-e5d7@gregkh/","summary":"CVE Announce auf lore.kernel.org vom 2024-02-20","category":"external"},{"url":"http://lore.kernel.org/linux-cve-announce/2024022024-uniquely-recluse-d893@gregkh/","summary":"CVE Announce auf lore.kernel.org vom 2024-02-20","category":"external"},{"url":"http://lore.kernel.org/linux-cve-announce/2024022026-wobbling-jumbo-748e@gregkh/","summary":"CVE Announce auf lore.kernel.org vom 2024-02-20","category":"external"},{"url":"http://lore.kernel.org/linux-cve-announce/2024022033-makeshift-flammable-cb72@gregkh/","summary":"CVE Announce auf lore.kernel.org vom 2024-02-20","category":"external"},{"url":"http://lore.kernel.org/linux-cve-announce/2024022048-rind-huff-b1a2@gregkh/","summary":"CVE Announce auf lore.kernel.org vom 2024-02-20","category":"external"},{"url":"http://lore.kernel.org/linux-cve-announce/2024022056-operative-cork-082c@gregkh/","summary":"CVE Announce auf lore.kernel.org vom 2024-02-20","category":"external"},{"url":"http://lore.kernel.org/linux-cve-announce/2024022058-outsell-equator-e1c5@gregkh/","summary":"CVE Announce auf lore.kernel.org vom 2024-02-20","category":"external"},{"url":"https://github.com/advisories/GHSA-42p9-m692-hxrc","summary":"GitHub Advisory Database vom 2024-02-20","category":"external"},{"url":"https://github.com/advisories/GHSA-25g3-q597-79m8","summary":"GitHub Advisory Database vom 2024-02-20","category":"external"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2265185","summary":"GitHub Advisory Database vom 2024-02-20","category":"external"},{"url":"https://github.com/advisories/GHSA-7gq6-cq6r-rrpx","summary":"GitHub Advisory Database vom 2024-02-20","category":"external"},{"url":"https://github.com/advisories/GHSA-23gm-fr88-2r8c","summary":"GitHub Advisory Database vom 2024-02-20","category":"external"},{"url":"https://github.com/advisories/GHSA-6vr7-3j3q-8546","summary":"GitHub Advisory Database vom 2024-02-20","category":"external"},{"url":"https://github.com/advisories/GHSA-74mg-f7w3-pcrr","summary":"GitHub Advisory Database vom 2024-02-20","category":"external"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2265184","summary":"GitHub Advisory Database vom 2024-02-20","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-2024-d16d94b00d","summary":"Fedora Security Advisory FEDORA-2024-D16D94B00D vom 2024-02-24","category":"external"},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-2024-71f0f16533","summary":"Fedora Security Advisory FEDORA-2024-71F0F16533 vom 2024-02-24","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2024-061.html","summary":"Amazon Linux Security Advisory ALASKERNEL-5.4-2024-061 vom 2024-03-06","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-051.html","summary":"Amazon Linux Security Advisory ALASKERNEL-5.10-2024-051 vom 2024-03-06","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6688-1","summary":"Ubuntu Security Notice USN-6688-1 vom 2024-03-11","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html","summary":"SUSE Security Update SUSE-SU-2024:0855-1 vom 2024-03-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html","summary":"SUSE Security Update SUSE-SU-2024:0858-1 vom 2024-03-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html","summary":"SUSE Security Update SUSE-SU-2024:0857-1 vom 2024-03-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html","summary":"SUSE Security Update SUSE-SU-2024:0856-1 vom 2024-03-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html","summary":"SUSE Security Update SUSE-SU-2024:0900-1 vom 2024-03-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html","summary":"SUSE Security Update SUSE-SU-2024:0910-1 vom 2024-03-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html","summary":"SUSE Security Update SUSE-SU-2024:0900-2 vom 2024-03-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html","summary":"SUSE Security Update SUSE-SU-2024:0926-1 vom 2024-03-22","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html","summary":"SUSE Security Update SUSE-SU-2024:0977-1 vom 2024-03-22","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2024-062.html","summary":"Amazon Linux Security Advisory ALASKERNEL-5.4-2024-062 vom 2024-04-01","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2024-040.html","summary":"Amazon Linux Security Advisory ALASKERNEL-5.15-2024-040 vom 2024-04-01","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-053.html","summary":"Amazon Linux Security Advisory ALASKERNEL-5.10-2024-053 vom 2024-04-01","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-052.html","summary":"Amazon Linux Security Advisory ALASKERNEL-5.10-2024-052 vom 2024-04-01","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6724-1","summary":"Ubuntu Security Notice USN-6724-1 vom 2024-04-09","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6726-1","summary":"Ubuntu Security Notice USN-6726-1 vom 2024-04-09","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6725-1","summary":"Ubuntu Security Notice USN-6725-1 vom 2024-04-09","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6725-2","summary":"Ubuntu Security Notice USN-6725-2 vom 2024-04-16","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6726-2","summary":"Ubuntu Security Notice USN-6726-2 vom 2024-04-16","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6724-2","summary":"Ubuntu Security Notice USN-6724-2 vom 2024-04-16","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6726-3","summary":"Ubuntu Security Notice USN-6726-3 vom 2024-04-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6741-1","summary":"Ubuntu Security Notice USN-6741-1 vom 2024-04-19","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6743-1","summary":"Ubuntu Security Notice USN-6743-1 vom 2024-04-19","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6742-1","summary":"Ubuntu Security Notice USN-6742-1 vom 2024-04-19","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6743-2","summary":"Ubuntu Security Notice USN-6743-2 vom 2024-04-22","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6742-2","summary":"Ubuntu Security Notice USN-6742-2 vom 2024-04-23","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6743-3","summary":"Ubuntu Security Notice USN-6743-3 vom 2024-04-25","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:2394","summary":"Red Hat Security Advisory RHSA-2024:2394 vom 2024-04-30","category":"external"},{"url":"https://lists.debian.org/debian-security-announce/2024/msg00090.html","summary":"Debian Security Advisory DSA-5681 vom 2024-05-06","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6767-1","summary":"Ubuntu Security Notice USN-6767-1 vom 2024-05-07","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6766-1","summary":"Ubuntu Security Notice USN-6766-1 vom 2024-05-07","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6767-2","summary":"Ubuntu Security Notice USN-6767-2 vom 2024-05-14","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6766-2","summary":"Ubuntu Security Notice USN-6766-2 vom 2024-05-15","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6777-1","summary":"Ubuntu Security Notice USN-6777-1 vom 2024-05-16","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2024-065.html","summary":"Amazon Linux Security Advisory ALASKERNEL-5.4-2024-065 vom 2024-05-20","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6766-3","summary":"Ubuntu Security Notice USN-6766-3 vom 2024-05-20","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6777-2","summary":"Ubuntu Security Notice USN-6777-2 vom 2024-05-20","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6777-3","summary":"Ubuntu Security Notice USN-6777-3 vom 2024-05-22","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:2950","summary":"Red Hat Security Advisory RHSA-2024:2950 vom 2024-05-22","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:3138","summary":"Red Hat Security Advisory RHSA-2024:3138 vom 2024-05-22","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6777-4","summary":"Ubuntu Security Notice USN-6777-4 vom 2024-05-23","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6795-1","summary":"Ubuntu Security Notice USN-6795-1 vom 2024-05-28","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:3618","summary":"Red Hat Security Advisory RHSA-2024:3618 vom 2024-06-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:3627","summary":"Red Hat Security Advisory RHSA-2024:3627 vom 2024-06-05","category":"external"},{"url":"https://oss.oracle.com/pipermail/el-errata/2024-June/015806.html","summary":"Oracle Linux Security Advisory ELSA-2024-12385 vom 2024-06-05","category":"external"},{"url":"https://oss.oracle.com/pipermail/el-errata/2024-June/015807.html","summary":"Oracle Linux Security Advisory ELSA-2024-12385 vom 2024-06-05","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-3618.html","summary":"Oracle Linux Security Advisory ELSA-2024-3618 vom 2024-06-06","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6821-1","summary":"Ubuntu Security Notice USN-6821-1 vom 2024-06-08","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7156774","summary":"IBM Security Bulletin 7156774 vom 2024-06-07","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6820-1","summary":"Ubuntu Security Notice USN-6820-1 vom 2024-06-08","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6821-2","summary":"Ubuntu Security Notice USN-6821-2 vom 2024-06-10","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6828-1","summary":"Ubuntu Security Notice USN-6828-1 vom 2024-06-11","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6820-2","summary":"Ubuntu Security Notice USN-6820-2 vom 2024-06-11","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6821-3","summary":"Ubuntu Security Notice USN-6821-3 vom 2024-06-11","category":"external"},{"url":"https://ubuntu.com/security/notices/LSN-0104-1","summary":"Ubuntu Security Notice LSN-0104-1 vom 2024-06-11","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018711.html","summary":"SUSE Security Update SUSE-SU-2024:2010-1 vom 2024-06-12","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6821-4","summary":"Ubuntu Security Notice USN-6821-4 vom 2024-06-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018809.html","summary":"SUSE Security Update SUSE-SU-2024:2185-1 vom 2024-06-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018808.html","summary":"SUSE Security Update SUSE-SU-2024:2183-1 vom 2024-06-24","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html","summary":"Debian Security Advisory DLA-3842 vom 2024-06-25","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html","summary":"Debian Security Advisory DLA-3841 vom 2024-06-25","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html","summary":"Debian Security Advisory DLA-3840 vom 2024-06-27","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6871-1","summary":"Ubuntu Security Notice USN-6871-1 vom 2024-07-04","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4415","summary":"Red Hat Security Advisory RHSA-2024:4415 vom 2024-07-09","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4412","summary":"Red Hat Security Advisory RHSA-2024:4412 vom 2024-07-09","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6892-1","summary":"Ubuntu Security Notice USN-6892-1 vom 2024-07-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4831","summary":"Red Hat Security Advisory RHSA-2024:4831 vom 2024-07-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4823","summary":"Red Hat Security Advisory RHSA-2024:4823 vom 2024-07-24","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6919-1","summary":"Ubuntu Security Notice USN-6919-1 vom 2024-07-26","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6926-1","summary":"Ubuntu Security Notice USN-6926-1 vom 2024-07-29","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6938-1","summary":"Ubuntu Security Notice USN-6938-1 vom 2024-07-31","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7162077","summary":"IBM Security Bulletin 7162077 vom 2024-07-31","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6926-2","summary":"Ubuntu Security Notice USN-6926-2 vom 2024-08-01","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html","summary":"SUSE Security Update SUSE-SU-2024:2802-1 vom 2024-08-07","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6951-1","summary":"Ubuntu Security Notice USN-6951-1 vom 2024-08-09","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6953-1","summary":"Ubuntu Security Notice USN-6953-1 vom 2024-08-09","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6926-3","summary":"Ubuntu Security Notice USN-6926-3 vom 2024-08-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html","summary":"SUSE Security Update SUSE-SU-2024:2896-1 vom 2024-08-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019182.html","summary":"SUSE Security Update SUSE-SU-2024:2894-1 vom 2024-08-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5281","summary":"Red Hat Security Advisory RHSA-2024:5281 vom 2024-08-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html","summary":"SUSE Security Update SUSE-SU-2024:2892-1 vom 2024-08-13","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6951-2","summary":"Ubuntu Security Notice USN-6951-2 vom 2024-08-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html","summary":"SUSE Security Update SUSE-SU-2024:2939-1 vom 2024-08-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019220.html","summary":"SUSE Security Update SUSE-SU-2024:2947-1 vom 2024-08-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019212.html","summary":"SUSE Security Update SUSE-SU-2024:2940-1 vom 2024-08-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html","summary":"SUSE Security Update SUSE-SU-2024:2203-1 vom 2024-08-19","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6951-3","summary":"Ubuntu Security Notice USN-6951-3 vom 2024-08-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html","summary":"SUSE Security Update SUSE-SU-2024:2973-1 vom 2024-08-20","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5692","summary":"Red Hat Security Advisory RHSA-2024:5692 vom 2024-08-21","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6951-4","summary":"Ubuntu Security Notice USN-6951-4 vom 2024-08-21","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6979-1","summary":"Ubuntu Security Notice USN-6979-1 vom 2024-08-22","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5928","summary":"Red Hat Security Advisory RHSA-2024:5928 vom 2024-08-28","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-5928.html","summary":"Oracle Linux Security Advisory ELSA-2024-5928 vom 2024-08-29","category":"external"},{"url":"https://securityonline.info/cve-2024-26581-poc-exploit-released-linux-systems-at-risk-of-root-compromise/","summary":"SecurityOnline.info vom 2024-09-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:6993","summary":"Red Hat Security Advisory RHSA-2024:6993 vom 2024-09-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:6997","summary":"Red Hat Security Advisory RHSA-2024:6997 vom 2024-09-24","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-6997.html","summary":"Oracle Linux Security Advisory ELSA-2024-6997 vom 2024-09-26","category":"external"},{"url":"https://www.dell.com/support/kbdoc/de-de/000234730/dsa-2024-422-security-update-for-dell-networker-vproxy-multiple-component-vulnerabilities","summary":"Dell Security Advisory DSA-2024-422 vom 2024-10-10","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7173960","summary":"IBM Security Bulletin 7173960 vom 2024-10-23","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7123-1","summary":"Ubuntu Security Notice USN-7123-1 vom 2024-11-20","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7194-1","summary":"Ubuntu Security Notice USN-7194-1 vom 2025-01-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html","summary":"SUSE Security Update SUSE-SU-2025:0236-1 vom 2025-01-24","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7230557","summary":"IBM Security Bulletin 7230557 vom 2025-04-10","category":"external"},{"url":"https://www.dell.com/support/kbdoc/de-de/000326299/dsa-2025-213-security-update-for-dell-avamar-dell-networker-virtual-edition-nve-and-dell-powerprotect-dp-series-appliance-dell-integrated-data-protection-appliance-idpa-multiple-third-party-vulnerabilities","summary":"Dell Security Advisory DSA-2025-213 vom 2025-05-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html","summary":"SUSE Security Update SUSE-SU-2025:20028-1 vom 2025-06-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021403.html","summary":"SUSE Security Update SUSE-SU-2025:20008-1 vom 2025-06-04","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html","summary":"SUSE Security Update SUSE-SU-2026:0474-1 vom 2026-02-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html","summary":"SUSE Security Update SUSE-SU-2026:0496-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024176.html","summary":"SUSE Security Update SUSE-SU-2026:20319-1 vom 2026-02-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html","summary":"SUSE Security Update SUSE-SU-2026:0617-1 vom 2026-02-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/025031.html","summary":"SUSE Security Update SUSE-SU-2026:1131-1 vom 2026-03-30","category":"external"}],"severity":"medium","cvss":null,"exploited":false,"vex_status":"affected","vex_keys":["known_affected"],"candidates":[{"url":"http://lore.kernel.org/linux-cve-announce/2024022009-subsoil-halt-4b28@gregkh/","published":"2024-02-20","updated":"2026-03-29","checked_at":null,"status_ok":null,"source_kind":"bsi_csaf","confidence":0.95}],"source_doc_published":null,"source_doc_updated":null,"cve_published":null,"cve_updated":null,"link_checked_at":null,"sourceUrl":"http://lore.kernel.org/linux-cve-announce/2024022009-subsoil-halt-4b28@gregkh/","added":"2026-02-06T07:32:06.712Z","public_url":"http://lore.kernel.org/linux-cve-announce/2024022009-subsoil-halt-4b28@gregkh/","public_source":"BSI","public_source_slug":"bsi","public_published":"2024-02-20","public_updated":"2026-03-29","public_display_date":"2026-03-29","public_sort_date":"2026-03-29","public_period_date":"2026-03-29","severity_norm":"medium","vendor_slug":null,"search_text":"bsi:wid-sec-w-2024-0444 cve-2023-52433 linux kernel: mehrere schwachstellen bsi bsi"},{"id":"BSI:WID-SEC-W-2024-0920","cve":"CVE-2023-52644","title":"Linux Kernel: Mehrere Schwachstellen","date":"2024-04-17","published":"2024-04-17","updated":"2026-03-29","source_published":"2024-04-17","source_updated":"2026-03-29","date_basis":"bsi_csaf","vendor":"","product":"","source":"BSI","source_url":"https://lore.kernel.org/linux-cve-announce/","links":[{"url":"https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0920.json","summary":"WID-SEC-W-2024-0920 - CSAF Version","category":"self"},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0920","summary":"WID-SEC-2024-0920 - Portal Version","category":"self"},{"url":"https://lore.kernel.org/linux-cve-announce/","summary":"Linux Kernel CVE Announcements vom 2024-04-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html","summary":"SUSE Security Update SUSE-SU-2024:1322-2 vom 2024-04-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-April/018431.html","summary":"SUSE Security Update SUSE-SU-2024:1454-1 vom 2024-04-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-April/018438.html","summary":"SUSE Security Update SUSE-SU-2024:1466-1 vom 2024-04-29","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-April/018444.html","summary":"SUSE Security Update SUSE-SU-2024:1480-1 vom 2024-04-30","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-May/018445.html","summary":"SUSE Security Update SUSE-SU-2024:1490-1 vom 2024-05-03","category":"external"},{"url":"https://lists.debian.org/debian-security-announce/2024/msg00090.html","summary":"Debian Security Advisory DSA-5681 vom 2024-05-06","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6767-1","summary":"Ubuntu Security Notice USN-6767-1 vom 2024-05-07","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6766-1","summary":"Ubuntu Security Notice USN-6766-1 vom 2024-05-07","category":"external"},{"url":"http://linux.oracle.com/errata/ELSA-2024-12380.html","summary":"Oracle Linux Security Advisory ELSA-2024-12380 vom 2024-05-14","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6767-2","summary":"Ubuntu Security Notice USN-6767-2 vom 2024-05-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-May/018531.html","summary":"SUSE Security Update SUSE-SU-2024:1641-1 vom 2024-05-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-May/018530.html","summary":"SUSE Security Update SUSE-SU-2024:1642-1 vom 2024-05-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-May/018525.html","summary":"SUSE Security Update SUSE-SU-2024:1647-1 vom 2024-05-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-May/018529.html","summary":"SUSE Security Update SUSE-SU-2024:1643-1 vom 2024-05-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-May/018528.html","summary":"SUSE Security Update SUSE-SU-2024:1644-1 vom 2024-05-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-May/018526.html","summary":"SUSE Security Update SUSE-SU-2024:1646-1 vom 2024-05-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-May/018527.html","summary":"SUSE Security Update SUSE-SU-2024:1645-1 vom 2024-05-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-May/018524.html","summary":"SUSE Security Update SUSE-SU-2024:1648-1 vom 2024-05-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-May/018533.html","summary":"SUSE Security Update SUSE-SU-2024:1650-1 vom 2024-05-15","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6766-2","summary":"Ubuntu Security Notice USN-6766-2 vom 2024-05-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-May/018538.html","summary":"SUSE Security Update SUSE-SU-2024:1659-1 vom 2024-05-15","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6766-3","summary":"Ubuntu Security Notice USN-6766-3 vom 2024-05-20","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-May/018572.html","summary":"SUSE Security Update SUSE-SU-2024:1648-2 vom 2024-05-21","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-054.html","summary":"Amazon Linux Security Advisory ALASKERNEL-5.10-2024-054 vom 2024-05-24","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6795-1","summary":"Ubuntu Security Notice USN-6795-1 vom 2024-05-28","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-May/018634.html","summary":"SUSE Security Update SUSE-SU-2024:1870-1 vom 2024-05-30","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALAS-2024-2549.html","summary":"Amazon Linux Security Advisory ALAS-2024-2549 vom 2024-05-30","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2024-067.html","summary":"Amazon Linux Security Advisory ALASKERNEL-5.4-2024-067 vom 2024-05-30","category":"external"},{"url":"https://lists.debian.org/debian-security-announce/2024/msg00113.html","summary":"Debian Security Advisory DSA-5703 vom 2024-06-02","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:3618","summary":"Red Hat Security Advisory RHSA-2024:3618 vom 2024-06-05","category":"external"},{"url":"https://oss.oracle.com/pipermail/el-errata/2024-June/015802.html","summary":"Oracle Linux Security Advisory ELSA-2024-12377 vom 2024-06-05","category":"external"},{"url":"https://oss.oracle.com/pipermail/el-errata/2024-June/015801.html","summary":"Oracle Linux Security Advisory ELSA-2024-12377 vom 2024-06-05","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:3627","summary":"Red Hat Security Advisory RHSA-2024:3627 vom 2024-06-05","category":"external"},{"url":"https://oss.oracle.com/pipermail/el-errata/2024-June/015806.html","summary":"Oracle Linux Security Advisory ELSA-2024-12385 vom 2024-06-05","category":"external"},{"url":"https://oss.oracle.com/pipermail/el-errata/2024-June/015807.html","summary":"Oracle Linux Security Advisory ELSA-2024-12385 vom 2024-06-05","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-3618.html","summary":"Oracle Linux Security Advisory ELSA-2024-3618 vom 2024-06-06","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6817-1","summary":"Ubuntu Security Notice USN-6817-1 vom 2024-06-08","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6821-1","summary":"Ubuntu Security Notice USN-6821-1 vom 2024-06-08","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6816-1","summary":"Ubuntu Security Notice USN-6816-1 vom 2024-06-08","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6820-1","summary":"Ubuntu Security Notice USN-6820-1 vom 2024-06-08","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6821-2","summary":"Ubuntu Security Notice USN-6821-2 vom 2024-06-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018685.html","summary":"SUSE Security Update SUSE-SU-2024:1979-1 vom 2024-06-11","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6817-2","summary":"Ubuntu Security Notice USN-6817-2 vom 2024-06-11","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2024-044.html","summary":"Amazon Linux Security Advisory ALASKERNEL-5.15-2024-044 vom 2024-06-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018700.html","summary":"SUSE Security Update SUSE-SU-2024:1983-1 vom 2024-06-11","category":"external"},{"url":"https://ubuntu.com/security/notices/LSN-0104-1","summary":"Ubuntu Security Notice LSN-0104-1 vom 2024-06-11","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6820-2","summary":"Ubuntu Security Notice USN-6820-2 vom 2024-06-11","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6821-3","summary":"Ubuntu Security Notice USN-6821-3 vom 2024-06-11","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6828-1","summary":"Ubuntu Security Notice USN-6828-1 vom 2024-06-11","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018706.html","summary":"SUSE Security Update SUSE-SU-2024:2008-1 vom 2024-06-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018710.html","summary":"SUSE Security Update SUSE-SU-2024:2011-1 vom 2024-06-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018711.html","summary":"SUSE Security Update SUSE-SU-2024:2010-1 vom 2024-06-12","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6831-1","summary":"Ubuntu Security Notice USN-6831-1 vom 2024-06-12","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6821-4","summary":"Ubuntu Security Notice USN-6821-4 vom 2024-06-14","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6817-3","summary":"Ubuntu Security Notice USN-6817-3 vom 2024-06-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018763.html","summary":"SUSE Security Update SUSE-SU-2024:2096-1 vom 2024-06-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018760.html","summary":"SUSE Security Update SUSE-SU-2024:2101-1 vom 2024-06-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018761.html","summary":"SUSE Security Update SUSE-SU-2024:2100-1 vom 2024-06-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018762.html","summary":"SUSE Security Update SUSE-SU-2024:2099-1 vom 2024-06-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018766.html","summary":"SUSE Security Update SUSE-SU-2024:2091-1 vom 2024-06-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018765.html","summary":"SUSE Security Update SUSE-SU-2024:2092-1 vom 2024-06-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018764.html","summary":"SUSE Security Update SUSE-SU-2024:2094-1 vom 2024-06-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018772.html","summary":"SUSE Security Update SUSE-SU-2024:2109-1 vom 2024-06-21","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018783.html","summary":"SUSE Security Update SUSE-SU-2024:2135-1 vom 2024-06-21","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018791.html","summary":"SUSE Security Update SUSE-SU-2024:2145-1 vom 2024-06-21","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018773.html","summary":"SUSE Security Update SUSE-SU-2024:2139-1 vom 2024-06-21","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018789.html","summary":"SUSE Security Update SUSE-SU-2024:2148-1 vom 2024-06-21","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018787.html","summary":"SUSE Security Update SUSE-SU-2024:2156-1 vom 2024-06-21","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018774.html","summary":"SUSE Security Update SUSE-SU-2024:2130-1 vom 2024-06-21","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018786.html","summary":"SUSE Security Update SUSE-SU-2024:2160-1 vom 2024-06-21","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018785.html","summary":"SUSE Security Update SUSE-SU-2024:2162-1 vom 2024-06-21","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018775.html","summary":"SUSE Security Update SUSE-SU-2024:2124-1 vom 2024-06-21","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018784.html","summary":"SUSE Security Update SUSE-SU-2024:2163-1 vom 2024-06-21","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018776.html","summary":"SUSE Security Update SUSE-SU-2024:2121-1 vom 2024-06-21","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018797.html","summary":"SUSE Security Update SUSE-SU-2024:2166-1 vom 2024-06-21","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018792.html","summary":"SUSE Security Update SUSE-SU-2024:2143-1 vom 2024-06-21","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018777.html","summary":"SUSE Security Update SUSE-SU-2024:2120-1 vom 2024-06-21","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018798.html","summary":"SUSE Security Update SUSE-SU-2024:2165-1 vom 2024-06-21","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018778.html","summary":"SUSE Security Update SUSE-SU-2024:2115-1 vom 2024-06-21","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018779.html","summary":"SUSE Security Update SUSE-SU-2024:2123-1 vom 2024-06-21","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018799.html","summary":"SUSE Security Update SUSE-SU-2024:2164-1 vom 2024-06-21","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018809.html","summary":"SUSE Security Update SUSE-SU-2024:2185-1 vom 2024-06-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018807.html","summary":"SUSE Security Update SUSE-SU-2024:2184-1 vom 2024-06-24","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018811.html","summary":"SUSE Security Update SUSE-SU-2024:2189-1 vom 2024-06-25","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html","summary":"Debian Security Advisory DLA-3842 vom 2024-06-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018821.html","summary":"SUSE Security Update SUSE-SU-2024:2216-1 vom 2024-06-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018822.html","summary":"SUSE Security Update SUSE-SU-2024:2209-1 vom 2024-06-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018820.html","summary":"SUSE Security Update SUSE-SU-2024:2217-1 vom 2024-06-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018823.html","summary":"SUSE Security Update SUSE-SU-2024:2208-1 vom 2024-06-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018824.html","summary":"SUSE Security Update SUSE-SU-2024:2207-1 vom 2024-06-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018812.html","summary":"SUSE Security Update SUSE-SU-2024:2191-1 vom 2024-06-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018825.html","summary":"SUSE Security Update SUSE-SU-2024:2205-1 vom 2024-06-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018826.html","summary":"SUSE Security Update SUSE-SU-2024:2221-1 vom 2024-06-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018827.html","summary":"SUSE Security Update SUSE-SU-2024:2202-1 vom 2024-06-25","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018819.html","summary":"SUSE Security Update SUSE-SU-2024:2190-1 vom 2024-06-25","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html","summary":"Debian Security Advisory DLA-3843 vom 2024-06-27","category":"external"},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html","summary":"Debian Security Advisory DLA-3840 vom 2024-06-27","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4211","summary":"Red Hat Security Advisory RHSA-2024:4211 vom 2024-07-02","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-4211.html","summary":"Oracle Linux Security Advisory ELSA-2024-4211 vom 2024-07-03","category":"external"},{"url":"https://www.dell.com/support/kbdoc/de-de/000226633/dsa-2024-022-security-update-for-dell-networker-vproxy-multiple-component-vulnerabilities","summary":"Dell Security Advisory DSA-2024-022 vom 2024-07-03","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6865-1","summary":"Ubuntu Security Notice USN-6865-1 vom 2024-07-04","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6871-1","summary":"Ubuntu Security Notice USN-6871-1 vom 2024-07-04","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6867-1","summary":"Ubuntu Security Notice USN-6867-1 vom 2024-07-04","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6866-1","summary":"Ubuntu Security Notice USN-6866-1 vom 2024-07-04","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6865-2","summary":"Ubuntu Security Notice USN-6865-2 vom 2024-07-04","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6866-2","summary":"Ubuntu Security Notice USN-6866-2 vom 2024-07-04","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6878-1","summary":"Ubuntu Security Notice USN-6878-1 vom 2024-07-04","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4352","summary":"Red Hat Security Advisory RHSA-2024:4352 vom 2024-07-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html","summary":"SUSE Security Update SUSE-SU-2024:2337-1 vom 2024-07-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018882.html","summary":"SUSE Security Update SUSE-SU-2024:2335-1 vom 2024-07-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018901.html","summary":"SUSE Security Update SUSE-SU-2024:2372-1 vom 2024-07-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018899.html","summary":"SUSE Security Update SUSE-SU-2024:2357-1 vom 2024-07-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018897.html","summary":"SUSE Security Update SUSE-SU-2024:2365-1 vom 2024-07-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018892.html","summary":"SUSE Security Update SUSE-SU-2024:2344-1 vom 2024-07-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018893.html","summary":"SUSE Security Update SUSE-SU-2024:2343-1 vom 2024-07-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018895.html","summary":"SUSE Security Update SUSE-SU-2024:2373-1 vom 2024-07-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018907.html","summary":"SUSE Security Update SUSE-SU-2024:2360-1 vom 2024-07-09","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018916.html","summary":"SUSE Security Update SUSE-SU-2024:2381-1 vom 2024-07-10","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6866-3","summary":"Ubuntu Security Notice USN-6866-3 vom 2024-07-10","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6892-1","summary":"Ubuntu Security Notice USN-6892-1 vom 2024-07-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018917.html","summary":"SUSE Security Update SUSE-SU-2024:2382-1 vom 2024-07-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018922.html","summary":"SUSE Security Update SUSE-SU-2024:2394-1 vom 2024-07-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4321","summary":"Red Hat Security Advisory RHSA-2024:4321 vom 2024-07-10","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6893-1","summary":"Ubuntu Security Notice USN-6893-1 vom 2024-07-11","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018943.html","summary":"SUSE Security Update SUSE-SU-2024:2472-1 vom 2024-07-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018944.html","summary":"SUSE Security Update SUSE-SU-2024:2449-1 vom 2024-07-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018946.html","summary":"SUSE Security Update SUSE-SU-2024:2447-1 vom 2024-07-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018945.html","summary":"SUSE Security Update SUSE-SU-2024:2448-1 vom 2024-07-12","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6895-1","summary":"Ubuntu Security Notice USN-6895-1 vom 2024-07-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018947.html","summary":"SUSE Security Update SUSE-SU-2024:2446-1 vom 2024-07-12","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6896-1","summary":"Ubuntu Security Notice USN-6896-1 vom 2024-07-12","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018942.html","summary":"SUSE Security Update SUSE-SU-2024:2473-1 vom 2024-07-12","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2024:4211","summary":"Rocky Linux Security Advisory RLSA-2024:4211 vom 2024-07-15","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2024:4352","summary":"Rocky Linux Security Advisory RLSA-2024:4352 vom 2024-07-15","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4554","summary":"Red Hat Security Advisory RHSA-2024:4554 vom 2024-07-16","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6893-2","summary":"Ubuntu Security Notice USN-6893-2 vom 2024-07-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018984.html","summary":"SUSE Security Update SUSE-SU-2024:2493-1 vom 2024-07-16","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6895-2","summary":"Ubuntu Security Notice USN-6895-2 vom 2024-07-16","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6896-2","summary":"Ubuntu Security Notice USN-6896-2 vom 2024-07-16","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4583","summary":"Red Hat Security Advisory RHSA-2024:4583 vom 2024-07-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6900-1","summary":"Ubuntu Security Notice USN-6900-1 vom 2024-07-17","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6896-3","summary":"Ubuntu Security Notice USN-6896-3 vom 2024-07-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/018999.html","summary":"SUSE Security Update SUSE-SU-2024:2558-1 vom 2024-07-18","category":"external"},{"url":"https://www.dell.com/support/kbdoc/de-de/000227051/dsa-2024-239-security-update-dell-ecs-3-8-1-1-for-multiple-security-vulnerabilities","summary":"Dell Security Advisory DSA-2024-239 vom 2024-07-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html","summary":"SUSE Security Update SUSE-SU-2024:2561-1 vom 2024-07-18","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-4583.html","summary":"Oracle Linux Security Advisory ELSA-2024-4583 vom 2024-07-19","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6896-4","summary":"Ubuntu Security Notice USN-6896-4 vom 2024-07-19","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6895-3","summary":"Ubuntu Security Notice USN-6895-3 vom 2024-07-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-July/019019.html","summary":"SUSE Security Update SUSE-SU-2024:2571-1 vom 2024-07-22","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6893-3","summary":"Ubuntu Security Notice USN-6893-3 vom 2024-07-23","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6896-5","summary":"Ubuntu Security Notice USN-6896-5 vom 2024-07-23","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4831","summary":"Red Hat Security Advisory RHSA-2024:4831 vom 2024-07-24","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4823","summary":"Red Hat Security Advisory RHSA-2024:4823 vom 2024-07-24","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2024:4583","summary":"Rocky Linux Security Advisory RLSA-2024:4583 vom 2024-07-26","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6918-1","summary":"Ubuntu Security Notice USN-6918-1 vom 2024-07-26","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6919-1","summary":"Ubuntu Security Notice USN-6919-1 vom 2024-07-26","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6923-1","summary":"Ubuntu Security Notice USN-6923-1 vom 2024-07-29","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6925-1","summary":"Ubuntu Security Notice USN-6925-1 vom 2024-07-29","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6926-1","summary":"Ubuntu Security Notice USN-6926-1 vom 2024-07-29","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4902","summary":"Red Hat Security Advisory RHSA-2024:4902 vom 2024-07-29","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6924-1","summary":"Ubuntu Security Notice USN-6924-1 vom 2024-07-29","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6923-2","summary":"Ubuntu Security Notice USN-6923-2 vom 2024-07-30","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:4928","summary":"Red Hat Security Advisory RHSA-2024:4928 vom 2024-07-31","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6927-1","summary":"Ubuntu Security Notice USN-6927-1 vom 2024-07-30","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6924-2","summary":"Ubuntu Security Notice USN-6924-2 vom 2024-07-30","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-4928.html","summary":"Oracle Linux Security Advisory ELSA-2024-4928 vom 2024-08-01","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2024:4928","summary":"Rocky Linux Security Advisory RLSA-2024:4928 vom 2024-08-01","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7162077","summary":"IBM Security Bulletin 7162077 vom 2024-07-31","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6938-1","summary":"Ubuntu Security Notice USN-6938-1 vom 2024-07-31","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6926-2","summary":"Ubuntu Security Notice USN-6926-2 vom 2024-08-01","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019090.html","summary":"SUSE Security Update SUSE-SU-2024:2722-1 vom 2024-08-02","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6895-4","summary":"Ubuntu Security Notice USN-6895-4 vom 2024-08-05","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019097.html","summary":"SUSE Security Update SUSE-SU-2024:2755-1 vom 2024-08-05","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019092.html","summary":"SUSE Security Update SUSE-SU-2024:2740-1 vom 2024-08-05","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019098.html","summary":"SUSE Security Update SUSE-SU-2024:2751-1 vom 2024-08-05","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019105.html","summary":"SUSE Security Update SUSE-SU-2024:2725-1 vom 2024-08-05","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019109.html","summary":"SUSE Security Update SUSE-SU-2024:2758-1 vom 2024-08-06","category":"external"},{"url":"https://www.dell.com/support/kbdoc/de-de/000227573/dsa-2024-348-security-update-for-dell-avamar-dell-networker-virtual-edition-nve-and-dell-powerprotect-dp-series-appliance-dell-integrated-data-protection-appliance-idpa-security-update-for-multiple-vulnerabilities","summary":"Dell Security Advisory DSA-2024-348 vom 2024-08-06","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5065","summary":"Red Hat Security Advisory RHSA-2024:5065 vom 2024-08-07","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019112.html","summary":"SUSE Security Update SUSE-SU-2024:2773-1 vom 2024-08-06","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html","summary":"SUSE Security Update SUSE-SU-2024:2802-1 vom 2024-08-07","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5102","summary":"Red Hat Security Advisory RHSA-2024:5102 vom 2024-08-08","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5101","summary":"Red Hat Security Advisory RHSA-2024:5101 vom 2024-08-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019155.html","summary":"SUSE Security Update SUSE-SU-2024:2821-1 vom 2024-08-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019143.html","summary":"SUSE Security Update SUSE-SU-2024:2851-1 vom 2024-08-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019145.html","summary":"SUSE Security Update SUSE-SU-2024:2843-1 vom 2024-08-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019144.html","summary":"SUSE Security Update SUSE-SU-2024:2850-1 vom 2024-08-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019146.html","summary":"SUSE Security Update SUSE-SU-2024:2841-1 vom 2024-08-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019147.html","summary":"SUSE Security Update SUSE-SU-2024:2840-1 vom 2024-08-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019151.html","summary":"SUSE Security Update SUSE-SU-2024:2825-1 vom 2024-08-08","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019152.html","summary":"SUSE Security Update SUSE-SU-2024:2824-1 vom 2024-08-08","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6950-1","summary":"Ubuntu Security Notice USN-6950-1 vom 2024-08-09","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6951-1","summary":"Ubuntu Security Notice USN-6951-1 vom 2024-08-09","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6953-1","summary":"Ubuntu Security Notice USN-6953-1 vom 2024-08-09","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-5101.html","summary":"Oracle Linux Security Advisory ELSA-2024-5101 vom 2024-08-09","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6926-3","summary":"Ubuntu Security Notice USN-6926-3 vom 2024-08-09","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5255","summary":"Red Hat Security Advisory RHSA-2024:5255 vom 2024-08-13","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6956-1","summary":"Ubuntu Security Notice USN-6956-1 vom 2024-08-13","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6950-2","summary":"Ubuntu Security Notice USN-6950-2 vom 2024-08-13","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6957-1","summary":"Ubuntu Security Notice USN-6957-1 vom 2024-08-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html","summary":"SUSE Security Update SUSE-SU-2024:2892-1 vom 2024-08-13","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6950-3","summary":"Ubuntu Security Notice USN-6950-3 vom 2024-08-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html","summary":"SUSE Security Update SUSE-SU-2024:2896-1 vom 2024-08-13","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019182.html","summary":"SUSE Security Update SUSE-SU-2024:2894-1 vom 2024-08-13","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5363","summary":"Red Hat Security Advisory RHSA-2024:5363 vom 2024-08-14","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5364","summary":"Red Hat Security Advisory RHSA-2024:5364 vom 2024-08-14","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5365","summary":"Red Hat Security Advisory RHSA-2024:5365 vom 2024-08-14","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6951-2","summary":"Ubuntu Security Notice USN-6951-2 vom 2024-08-14","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019194.html","summary":"SUSE Security Update SUSE-SU-2024:2901-1 vom 2024-08-14","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-5363.html","summary":"Oracle Linux Security Advisory ELSA-2024-5363 vom 2024-08-15","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html","summary":"SUSE Security Update SUSE-SU-2024:2939-1 vom 2024-08-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019220.html","summary":"SUSE Security Update SUSE-SU-2024:2947-1 vom 2024-08-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019212.html","summary":"SUSE Security Update SUSE-SU-2024:2940-1 vom 2024-08-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html","summary":"SUSE Security Update SUSE-SU-2024:1465-1 vom 2024-08-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html","summary":"SUSE Security Update SUSE-SU-2024:2203-1 vom 2024-08-19","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/MFQEXBT2XPZQJMUF7MN6ZVO5FXVY4NKK/","summary":"SUSE Security Update SUSE-SU-2024:1663-1 vom 2024-08-19","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6951-3","summary":"Ubuntu Security Notice USN-6951-3 vom 2024-08-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html","summary":"SUSE Security Update SUSE-SU-2024:1669-1 vom 2024-08-19","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/D5LYDXV5ACGHUYO5XWLWD5VAOA5HLJ7U/","summary":"SUSE Security Update SUSE-SU-2024:1489-1 vom 2024-08-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html","summary":"SUSE Security Update SUSE-SU-2024:2973-1 vom 2024-08-20","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5673","summary":"Red Hat Security Advisory RHSA-2024:5673 vom 2024-08-21","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5672","summary":"Red Hat Security Advisory RHSA-2024:5672 vom 2024-08-21","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2024:5101","summary":"Rocky Linux Security Advisory RLSA-2024:5101 vom 2024-08-21","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2024:5102","summary":"Rocky Linux Security Advisory RLSA-2024:5102 vom 2024-08-21","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6951-4","summary":"Ubuntu Security Notice USN-6951-4 vom 2024-08-21","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6976-1","summary":"Ubuntu Security Notice USN-6976-1 vom 2024-08-22","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6974-1","summary":"Ubuntu Security Notice USN-6974-1 vom 2024-08-22","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6973-1","summary":"Ubuntu Security Notice USN-6973-1 vom 2024-08-22","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6972-1","summary":"Ubuntu Security Notice USN-6972-1 vom 2024-08-21","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6950-4","summary":"Ubuntu Security Notice USN-6950-4 vom 2024-08-21","category":"external"},{"url":"https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2024-082.html","summary":"Amazon Linux Security Advisory ALASKERNEL-5.4-2024-082 vom 2024-08-21","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6972-2","summary":"Ubuntu Security Notice USN-6972-2 vom 2024-08-22","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6979-1","summary":"Ubuntu Security Notice USN-6979-1 vom 2024-08-22","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6972-3","summary":"Ubuntu Security Notice USN-6973-2 vom 2024-08-23","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6974-2","summary":"Ubuntu Security Notice USN-6974-2 vom 2024-08-23","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6973-2","summary":"Ubuntu Security Notice USN-6973-2 vom 2024-08-23","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6973-3","summary":"Ubuntu Security Notice USN-6973-3 vom 2024-08-26","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019322.html","summary":"SUSE Security Update SUSE-SU-2024:3043-1 vom 2024-08-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019321.html","summary":"SUSE Security Update SUSE-SU-2024:3044-1 vom 2024-08-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019326.html","summary":"SUSE Security Update SUSE-SU-2024:3037-1 vom 2024-08-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019320.html","summary":"SUSE Security Update SUSE-SU-2024:3048-1 vom 2024-08-27","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-August/019315.html","summary":"SUSE Security Update SUSE-SU-2024:3034-1 vom 2024-08-27","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6972-4","summary":"Ubuntu Security Notice USN-6972-4 vom 2024-08-29","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:5928","summary":"Red Hat Security Advisory RHSA-2024:5928 vom 2024-08-28","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-5928.html","summary":"Oracle Linux Security Advisory ELSA-2024-5928 vom 2024-08-29","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-6973-4","summary":"Ubuntu Security Notice USN-6973-4 vom 2024-09-02","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-12606.html","summary":"Oracle Linux Security Advisory ELSA-2024-12606 vom 2024-09-03","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:6206","summary":"Red Hat Security Advisory RHSA-2024:6206 vom 2024-09-03","category":"external"},{"url":"https://oss.oracle.com/pipermail/oraclevm-errata/2024-September/001099.html","summary":"ORACLE OVMSA-2024-0011 vom 2024-09-04","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7167662","summary":"IBM Security Bulletin 7167662 vom 2024-09-05","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019400.html","summary":"SUSE Security Update SUSE-SU-2024:3194-1 vom 2024-09-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019407.html","summary":"SUSE Security Update SUSE-SU-2024:3195-1 vom 2024-09-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html","summary":"SUSE Security Update SUSE-SU-2024:3190-1 vom 2024-09-10","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html","summary":"SUSE Security Update SUSE-SU-2024:3189-1 vom 2024-09-10","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:6567","summary":"Red Hat Security Advisory RHSA-2024:6567 vom 2024-09-11","category":"external"},{"url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YNWVZVIFSX7PLBJX3I3PDZ4MIBERTN2Y/","summary":"SUSE Security Update SUSE-SU-2024:3209-1 vom 2024-09-11","category":"external"},{"url":"https://linux.oracle.com/errata/ELSA-2024-6567.html","summary":"Oracle Linux Security Advisory ELSA-2024-6567 vom 2024-09-12","category":"external"},{"url":"https://ubuntu.com/security/notices/USN-7006-1","summary":"Ubuntu Security Notice USN-7006-1 vom 2024-09-12","category":"external"},{"url":"https://security.netapp.com/advisory/ntap-20240912-0011/","summary":"NetApp Security Advisory NTAP-20240912-0011 vom 2024-09-12","category":"external"},{"url":"https://errata.build.resf.org/RLSA-2024:6567","summary":"Rocky Linux Security Advisory RLSA-2024:6567 vom 2024-09-17","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019435.html","summary":"SUSE Security Update SUSE-SU-2024:3251-1 vom 2024-09-16","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019436.html","summary":"SUSE Security Update SUSE-SU-2024:3252-1 vom 2024-09-16","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:6744","summary":"Red Hat Security Advisory RHSA-2024:6744 vom 2024-09-18","category":"external"},{"url":"https://access.redhat.com/errata/RHSA-2024:6745","summary":"Red Hat Security Advisory RHSA-2024:6745 vom 2024-09-18","category":"external"},{"url":"https://www.ibm.com/support/pages/node/7168815","summary":"IBM Security Bulletin 7168815 vom 2024-09-18","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019461.html","summary":"SUSE Security Update SUSE-SU-2024:3318-1 vom 2024-09-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019478.html","summary":"SUSE Security Update SUSE-SU-2024:3347-1 vom 2024-09-19","category":"external"},{"url":"https://lists.suse.com/pipermail/sle-security-updates/2024-September/019468.html","summary":"SUSE Security Updat