Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-1999-0609 |
N/A
|
An incorrect configuration of the SoftCart CGI pr⦠|
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.678Z |
| CVE-1999-0610 |
N/A
|
An incorrect configuration of the Webcart CGI pro⦠|
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.691Z |
| CVE-1999-0611 |
N/A
|
A system-critical Windows NT registry key has an β¦ |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.691Z |
| CVE-1999-0613 |
N/A
|
The rpc.sprayd service is running. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.783Z |
| CVE-1999-0614 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The FTP service is running. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2003-03-21T10:00:00.000Z |
| CVE-1999-0615 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The SNMP service is running. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2002-05-09T09:00:00.000Z |
| CVE-1999-0616 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The TFTP service is running. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2003-03-21T10:00:00.000Z |
| CVE-1999-0617 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The SMTP service is running. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2003-03-21T10:00:00.000Z |
| CVE-1999-0618 |
N/A
|
The rexec service is running. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.715Z |
| CVE-1999-0619 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The Telnet service is running. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2003-03-21T10:00:00.000Z |
| CVE-1999-0620 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A component service related to NIS is running. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2003-03-21T10:00:00.000Z |
| CVE-1999-0621 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A component service related to NETBIOS is running. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2002-02-02T10:00:00.000Z |
| CVE-1999-0622 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A component service related to DNS service is running. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2003-03-21T10:00:00.000Z |
| CVE-1999-0623 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The X Windows service is running. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2003-03-21T10:00:00.000Z |
| CVE-1999-0624 |
N/A
|
The rstat/rstatd service is running. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.709Z |
| CVE-1999-0625 |
N/A
|
The rpc.rquotad service is running. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.710Z |
| CVE-1999-0629 |
N/A
|
The ident/identd service is running. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.674Z |
| CVE-1999-0630 |
N/A
|
The NT Alerter and Messenger services are running. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.690Z |
| CVE-1999-0631 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The NFS service is running. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2003-03-21T10:00:00.000Z |
| CVE-1999-0632 |
N/A
|
The RPC portmapper service is running. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.686Z |
| CVE-1999-0633 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The HTTP/WWW service is running. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2003-03-21T10:00:00.000Z |
| CVE-1999-0634 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The SSH service is running. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2003-03-21T10:00:00.000Z |
| CVE-1999-0635 |
N/A
|
The echo service is running. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.728Z |
| CVE-1999-0636 |
N/A
|
The discard service is running. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.728Z |
| CVE-1999-0637 |
N/A
|
The systat service is running. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.734Z |
| CVE-1999-0638 |
N/A
|
The daytime service is running. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.690Z |
| CVE-1999-0639 |
N/A
|
The chargen service is running. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:48:36.981Z |
| CVE-1999-0640 |
N/A
|
The Gopher service is running. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:48:37.588Z |
| CVE-1999-0641 |
N/A
|
The UUCP service is running. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:48:37.607Z |
| CVE-1999-0642 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A POP service is running. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2003-03-21T10:00:00.000Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-1999-0529 |
N/A
|
A router or firewall forwards packets that claim β¦ |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.227Z |
| CVE-1999-0530 |
N/A
|
A system is operating in "promiscuous" mode which⦠|
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.688Z |
| CVE-1999-0539 |
N/A
|
A trust relationship exists between two Unix hosts. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.533Z |
| CVE-1999-0547 |
N/A
|
An SSH server allows authentication through the .β¦ |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.708Z |
| CVE-1999-0548 |
N/A
|
A superfluous NFS server is running, but it is no⦠|
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.685Z |
| CVE-1999-0549 |
N/A
|
Windows NT automatically logs in an administrator⦠|
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.554Z |
| CVE-1999-0554 |
N/A
|
NFS exports system-critical data to the world, e.β¦ |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.685Z |
| CVE-1999-0555 |
N/A
|
A Unix account with a name other than "root" has β¦ |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.566Z |
| CVE-1999-0556 |
N/A
|
Two or more Unix accounts have the same UID. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.487Z |
| CVE-1999-0559 |
N/A
|
A system-critical Unix file or directory has inap⦠|
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.643Z |
| CVE-1999-0560 |
N/A
|
A system-critical Windows NT file or directory ha⦠|
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.462Z |
| CVE-1999-0561 |
N/A
|
IIS has the #exec function enabled for Server Sid⦠|
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.516Z |
| CVE-1999-0564 |
N/A
|
An attacker can force a printer to print arbitrar⦠|
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.562Z |
| CVE-1999-0565 |
N/A
|
A Sendmail alias allows input to be piped to a program. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.585Z |
| CVE-1999-0568 |
N/A
|
rpc.admind in Solaris is not running in a secure mode. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.611Z |
| CVE-1999-0569 |
N/A
|
A URL for a WWW directory allows auto-indexing, w⦠|
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.540Z |
| CVE-1999-0570 |
N/A
|
Windows NT is not using a password filter utility⦠|
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.711Z |
| CVE-1999-0571 |
N/A
|
A router's configuration service or management in⦠|
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.638Z |
| CVE-1999-0577 |
N/A
|
A Windows NT system's file audit policy does not β¦ |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.676Z |
| CVE-1999-0578 |
N/A
|
A Windows NT system's registry audit policy does β¦ |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.691Z |
| CVE-1999-0579 |
N/A
|
A Windows NT system's registry audit policy does β¦ |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.675Z |
| CVE-1999-0580 |
N/A
|
The HKEY_LOCAL_MACHINE key in a Windows NT system⦠|
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.690Z |
| CVE-1999-0581 |
N/A
|
The HKEY_CLASSES_ROOT key in a Windows NT system β¦ |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.670Z |
| CVE-1999-0583 |
N/A
|
There is a one-way or two-way trust relationship β¦ |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.688Z |
| CVE-1999-0584 |
N/A
|
A Windows NT file system is not NTFS. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.647Z |
| CVE-1999-0586 |
N/A
|
A network service is running on a nonstandard port. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.665Z |
| CVE-1999-0587 |
N/A
|
A WWW server is not running in a restricted file β¦ |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.687Z |
| CVE-1999-0588 |
N/A
|
A filter in a router or firewall allows unusual f⦠|
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.716Z |
| CVE-1999-0589 |
N/A
|
A system-critical Windows NT registry key has ina⦠|
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.688Z |
| CVE-1999-0591 |
N/A
|
An event log in Windows NT has inappropriate acce⦠|
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.649Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-1999-0495 | A remote attacker can gain access to a file system using .. (dot dot) when accessing SMB shares. | 1999-01-01T05:00:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-1999-0497 | Anonymous FTP is enabled. | 1999-01-01T05:00:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-1999-0512 | A mail server is explicitly configured to allow SMTP mail relay, which allows abuse by spammers. | 1999-01-01T05:00:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-1999-0515 | An unrestricted remote trust relationship for Unix systems has been set up, e.g. by using a + sign β¦ | 1999-01-01T05:00:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-1999-0520 | A system-critical NETBIOS/SMB share has inappropriate access control. | 1999-01-01T05:00:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-1999-0523 | ICMP echo (ping) is allowed from arbitrary hosts. | 1999-01-01T05:00:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-1999-0527 | The permissions for system-critical data in an anonymous FTP account are inappropriate. For exampl⦠| 1999-01-01T05:00:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-1999-0528 | A router or firewall forwards external packets that claim to come from inside the network that the β¦ | 1999-01-01T05:00:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-1999-0529 | A router or firewall forwards packets that claim to come from IANA reserved or private addresses, e⦠| 1999-01-01T05:00:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-1999-0530 | A system is operating in "promiscuous" mode which allows it to perform packet sniffing. | 1999-01-01T05:00:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-1999-0531 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is so⦠| 1999-01-01T05:00:00.000 | 2023-11-07T01:54:58.853 |
| fkie_cve-1999-0539 | A trust relationship exists between two Unix hosts. | 1999-01-01T05:00:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-1999-0547 | An SSH server allows authentication through the .rhosts file. | 1999-01-01T05:00:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-1999-0548 | A superfluous NFS server is running, but it is not importing or exporting any file systems. | 1999-01-01T05:00:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-1999-0549 | Windows NT automatically logs in an administrator upon rebooting. | 1999-01-01T05:00:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-1999-0554 | NFS exports system-critical data to the world, e.g. / or a password file. | 1999-01-01T05:00:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-1999-0555 | A Unix account with a name other than "root" has UID 0, i.e. root privileges. | 1999-01-01T05:00:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-1999-0556 | Two or more Unix accounts have the same UID. | 1999-01-01T05:00:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-1999-0559 | A system-critical Unix file or directory has inappropriate permissions. | 1999-01-01T05:00:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-1999-0560 | A system-critical Windows NT file or directory has inappropriate permissions. | 1999-01-01T05:00:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-1999-0561 | IIS has the #exec function enabled for Server Side Include (SSI) files. | 1999-01-01T05:00:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-1999-0564 | An attacker can force a printer to print arbitrary documents (e.g. if the printer doesn't require a⦠| 1999-01-01T05:00:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-1999-0565 | A Sendmail alias allows input to be piped to a program. | 1999-01-01T05:00:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-1999-0568 | rpc.admind in Solaris is not running in a secure mode. | 1999-01-01T05:00:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-1999-0569 | A URL for a WWW directory allows auto-indexing, which provides a list of all files in that director⦠| 1999-01-01T05:00:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-1999-0570 | Windows NT is not using a password filter utility, e.g. PASSFILT.DLL. | 1999-01-01T05:00:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-1999-0571 | A router's configuration service or management interface (such as a web server or telnet) is config⦠| 1999-01-01T05:00:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-1999-0577 | A Windows NT system's file audit policy does not log an event success or failure for non-critical f⦠| 1999-01-01T05:00:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-1999-0578 | A Windows NT system's registry audit policy does not log an event success or failure for security-c⦠| 1999-01-01T05:00:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-1999-0579 | A Windows NT system's registry audit policy does not log an event success or failure for non-critic⦠| 1999-01-01T05:00:00.000 | 2026-04-16T00:27:16.627 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-vvjc-q5vr-52q6 |
9.8 (3.1)
|
Apache Camel's Jackson and JacksonXML unmarshalling operation are vulnerable to Remote Code Executi⦠| 2018-10-16T23:13:00Z | 2023-12-19T23:04:54Z |
| ghsa-vq9j-jh62-5hmp |
7.4 (3.1)
|
Apache Camel's Validation Component is vulnerable against SSRF via remote DTDs and XXE. | 2018-10-16T23:13:11Z | 2023-12-19T22:22:28Z |
| ghsa-2fw5-rvf2-jq56 |
|
Apache Camel's XSLT component allows remote attackers to read arbitrary files | 2018-10-16T23:13:26Z | 2023-02-15T22:19:10Z |
| ghsa-h6rp-8v4j-hwph |
|
Apache Camel's XSLT component allows remote attackers to execute arbitrary Java methods | 2018-10-16T23:13:49Z | 2023-02-15T22:19:51Z |
| ghsa-5xqr-grq4-qwgx |
5.5 (3.1)
|
Junrar vulnerable to Infinite Loop | 2018-10-17T00:04:05Z | 2022-11-17T18:39:50Z |
| ghsa-cvj4-g3gx-8vqq |
7.5 (3.1)
|
Restlet Framework allows remote attackers to access arbitrary files via a crafted REST API HTTP request | 2018-10-17T00:04:18Z | 2022-04-26T21:37:05Z |
| ghsa-2mp8-qvqm-3xwq |
7.5 (3.1)
|
Restlet Framework Ja-rs extension is vulnerable to XXE when using SimpleXMLProvider | 2018-10-17T00:04:31Z | 2023-09-26T11:23:36Z |
| ghsa-73cq-fhp3-8rpw |
|
Moderate severity vulnerability that affects org.restlet.jse:org.restlet | 2018-10-17T00:04:53Z | 2021-09-02T19:18:12Z |
| ghsa-cfh5-3ghh-wfjx |
|
Improper Verification of Cryptographic Signature in org.apache.httpcomponents:httpclient | 2018-10-17T00:05:06Z | 2024-04-12T22:05:35Z |
| ghsa-2x83-r56g-cv47 |
|
Improper certificate validation in org.apache.httpcomponents:httpclient | 2018-10-17T00:05:15Z | 2024-03-05T18:49:27Z |
| ghsa-fmj5-wv96-r2ch |
|
Denial of service vulnerability in org.apache.httpcomponents:httpclient | 2018-10-17T00:05:29Z | 2023-02-13T18:20:06Z |
| ghsa-h8q5-g2cj-qr5h |
7.5 (3.1)
|
Apache Tika is vulnerable to entity expansions which can lead to a denial of service attack | 2018-10-17T15:43:25Z | 2022-04-26T21:46:04Z |
| ghsa-9r24-gp44-h3pm |
8.1 (3.1)
|
Command injection in org.apache.tika:tika-core | 2018-10-17T15:43:43Z | 2024-04-19T19:47:15Z |
| ghsa-p699-3wgc-7h72 |
5.5 (3.1)
|
org.apache.tika:tika-parsers has an Infinite Loop vulnerability | 2018-10-17T15:43:59Z | 2023-02-28T22:57:51Z |
| ghsa-ccjp-w723-2jf2 |
5.3 (3.1)
|
Apache Tika Server exposes sensitive information | 2018-10-17T15:44:10Z | 2023-09-12T15:51:03Z |
| ghsa-4xr4-4c65-hj7f |
7.8 (3.1)
|
Apache Tika does not properly initialize the XML parser or choose handlers | 2018-10-17T15:44:22Z | 2022-04-26T21:46:36Z |
| ghsa-j8g6-2wh7-6439 |
9.8 (3.1)
|
Apache Tika allows Java code execution for serialized objects embedded in MATLAB files | 2018-10-17T15:44:36Z | 2024-04-12T21:33:27Z |
| ghsa-6jq2-789q-fff2 |
7.5 (3.1)
|
High severity vulnerability that affects org.apache.tika:tika-core | 2018-10-17T15:49:36Z | 2021-09-02T16:41:17Z |
| ghsa-w6g3-v46q-5p28 |
5.9 (3.1)
|
Moderate severity vulnerability that affects org.apache.tika:tika-core | 2018-10-17T15:49:58Z | 2021-09-21T17:58:38Z |
| ghsa-j53j-gmr9-h8g3 |
5.5 (3.1)
|
Comparison errorr in org.apache.tika:tika-core | 2018-10-17T15:50:31Z | 2024-03-04T23:27:07Z |
| ghsa-5mf7-26mw-3rqr |
5.5 (3.1)
|
Moderate severity vulnerability that affects org.apache.tika:tika-core | 2018-10-17T15:50:45Z | 2021-09-01T22:17:57Z |
| ghsa-rvgg-f8qm-6h7j |
|
High severity vulnerability that affects io.vertx:vertx-web | 2018-10-17T16:19:43Z | 2024-04-12T21:17:45Z |
| ghsa-45xm-v8gq-7jqx |
6.5 (3.1)
|
Excessive memory allocation | 2018-10-17T16:19:59Z | 2022-04-25T20:23:45Z |
| ghsa-qh3m-qw6v-qvhg |
|
Moderate severity vulnerability that affects io.vertx:vertx-core | 2018-10-17T16:20:32Z | 2024-03-04T20:46:26Z |
| ghsa-h39x-m55c-v55h |
9.8 (3.1)
|
Eclipse Vert.x does not properly neutralize '' (forward slashes) sequences that can resolve to an e⦠| 2018-10-17T16:20:45Z | 2022-04-26T21:49:59Z |
| ghsa-4446-656p-f54g |
9.8 (3.1)
|
Deserialization of Untrusted Data in Bouncy castle | 2018-10-17T16:23:12Z | 2025-05-12T21:40:33Z |
| ghsa-4vhj-98r6-424h |
7.5 (3.1)
|
In Bouncy Castle JCE Provider it is possible to inject extra elements in the sequence making up the⦠| 2018-10-17T16:23:26Z | 2025-09-12T19:27:36Z |
| ghsa-c8xf-m4ff-jcxj |
5.3 (3.1)
|
Moderate severity vulnerability that affects org.bouncycastle:bcprov-jdk14 and org.bouncycastle:bcp⦠| 2018-10-17T16:23:38Z | 2025-09-12T19:12:44Z |
| ghsa-r97x-3g8f-gx3m |
7.5 (3.1)
|
The Bouncy Castle JCE Provider carry a propagation bug | 2018-10-17T16:23:50Z | 2025-09-12T19:28:32Z |
| ghsa-r9ch-m4fh-fc7q |
5.9 (3.1)
|
Moderate severity vulnerability that affects org.bouncycastle:bcprov-jdk14 and org.bouncycastle:bcp⦠| 2018-10-17T16:24:00Z | 2025-09-12T19:13:38Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2019-5 |
|
Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerabi⦠| ansible | 2019-03-27T13:29:00Z | 2020-05-21T14:55:00Z |
| pysec-2019-166 |
|
The Serialize.deserialize() method in CoAPthon3 1.0 and 1.0.1 mishandles certain exceptio⦠| coapthon3 | 2019-04-02T19:29:00Z | 2021-08-25T04:57:20.904496Z |
| pysec-2019-165 |
|
The Serialize.deserialize() method in CoAPthon 3.1, 4.0.0, 4.0.1, and 4.0.2 mishandles ce⦠| coapthon | 2019-04-02T20:29:00Z | 2021-08-25T04:57:20.831477Z |
| pysec-2019-107 |
|
nbla/logger.cpp in libnnabla.a in Sony Neural Network Libraries (aka nnabla) through v1.0β¦ | nnabla | 2019-04-04T05:29:00Z | 2019-04-05T20:09:00Z |
| pysec-2019-158 |
|
In Jupyter Notebook before 5.7.8, an open redirect can occur via an empty netloc. This is⦠| notebook | 2019-04-04T16:29:00Z | 2021-07-15T02:22:16.309397Z |
| pysec-2019-127 |
|
In trytond/model/modelstorage.py in Tryton 4.2 before 4.2.21, 4.4 before 4.4.19, 4.6 befo⦠| trytond | 2019-04-05T01:29:00Z | 2020-08-26T12:45:00Z |
| pysec-2019-189 |
|
An issue was discovered in OpenStack Neutron 11.x before 11.0.7, 12.x before 12.0.6, and β¦ | neutron | 2019-04-05T05:29:00Z | 2021-08-27T03:22:08.705789Z |
| pysec-2019-201 |
|
Roundup 1.6 allows XSS via the URI because frontends/roundup.cgi and roundup/cgi/wsgi_han⦠| roundup | 2019-04-06T20:29:00Z | 2021-09-02T01:11:35.189013Z |
| pysec-2019-217 |
|
In Pallets Jinja before 2.10.1, str.format_map allows a sandbox escape. | jinja2 | 2019-04-07T00:29:00Z | 2021-11-22T04:57:52.862665Z |
| pysec-2019-220 |
|
In Pallets Jinja before 2.8.1, str.format allows a sandbox escape. | jinja2 | 2019-04-08T13:29:00Z | 2021-11-22T04:57:52.929678Z |
| pysec-2019-214 |
|
A malicious admin user could edit the state of objects in the Airflow metadata database t⦠| apache-airflow | 2019-04-10T20:29:00Z | 2021-11-16T03:58:43.132049Z |
| pysec-2019-215 |
|
A number of HTTP endpoints in the Airflow webserver (both RBAC and classic) did not have β¦ | apache-airflow | 2019-04-10T20:29:00Z | 2021-11-16T03:58:43.176949Z |
| pysec-2019-132 |
|
In the urllib3 library through 1.24.1 for Python, CRLF injection is possible if the attac⦠| urllib3 | 2019-04-15T15:29:00Z | 2019-06-13T04:29:00Z |
| pysec-2019-198 |
|
OneLogin PythonSAML 2.3.0 and earlier may incorrectly utilize the results of XML DOM trav⦠| python-saml | 2019-04-17T14:29:00Z | 2021-08-27T03:22:18.581552Z |
| pysec-2019-133 |
|
The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired s⦠| urllib3 | 2019-04-18T21:29:00Z | 2019-09-14T18:15:00Z |
| pysec-2019-155 |
|
python-dbusmock before version 0.15.1 AddTemplate() D-Bus method call or DBusTestCase.spa⦠| python-dbusmock | 2019-04-22T16:29:00Z | 2021-07-05T00:01:25.330872Z |
| pysec-2019-188 |
|
A flaw was found in Mercurial before 4.9. It was possible to use symlinks and subreposito⦠| mercurial | 2019-04-22T16:29:00Z | 2021-08-27T03:22:07.409198Z |
| pysec-2019-206 |
|
Google TensorFlow 1.6.x and earlier is affected by: Null Pointer Dereference. The type of⦠| tensorflow | 2019-04-23T21:29:00Z | 2021-08-27T03:22:22.321158Z |
| pysec-2019-208 |
|
Google TensorFlow 1.7 and below is affected by: Buffer Overflow. The impact is: execute a⦠| tensorflow | 2019-04-23T21:29:00Z | 2021-08-27T03:22:22.407658Z |
| pysec-2019-224 |
|
Google TensorFlow 1.6.x and earlier is affected by: Null Pointer Dereference. The type of⦠| tensorflow-cpu | 2019-04-23T21:29:00Z | 2021-08-27T03:22:22.321158Z |
| pysec-2019-226 |
|
Google TensorFlow 1.7 and below is affected by: Buffer Overflow. The impact is: execute a⦠| tensorflow-cpu | 2019-04-23T21:29:00Z | 2021-08-27T03:22:22.407658Z |
| pysec-2019-231 |
|
Google TensorFlow 1.6.x and earlier is affected by: Null Pointer Dereference. The type of⦠| tensorflow-gpu | 2019-04-23T21:29:00Z | 2021-12-09T06:35:11.756170Z |
| pysec-2019-233 |
|
Google TensorFlow 1.7 and below is affected by: Buffer Overflow. The impact is: execute a⦠| tensorflow-gpu | 2019-04-23T21:29:00Z | 2021-12-09T06:35:11.845396Z |
| pysec-2019-204 |
|
Invalid memory access and/or a heap buffer overflow in the TensorFlow XLA compiler in Goo⦠| tensorflow | 2019-04-24T17:29:00Z | 2021-08-27T03:22:22.150023Z |
| pysec-2019-207 |
|
Memcpy parameter overlap in Google Snappy library 1.1.4, as used in Google TensorFlow bef⦠| tensorflow | 2019-04-24T17:29:00Z | 2021-08-27T03:22:22.362937Z |
| pysec-2019-210 |
|
NULL pointer dereference in Google TensorFlow before 1.12.2 could cause a denial of servi⦠| tensorflow | 2019-04-24T17:29:00Z | 2021-08-27T03:22:22.500832Z |
| pysec-2019-222 |
|
Invalid memory access and/or a heap buffer overflow in the TensorFlow XLA compiler in Goo⦠| tensorflow-cpu | 2019-04-24T17:29:00Z | 2021-08-27T03:22:22.150023Z |
| pysec-2019-225 |
|
Memcpy parameter overlap in Google Snappy library 1.1.4, as used in Google TensorFlow bef⦠| tensorflow-cpu | 2019-04-24T17:29:00Z | 2021-08-27T03:22:22.362937Z |
| pysec-2019-228 |
|
NULL pointer dereference in Google TensorFlow before 1.12.2 could cause a denial of servi⦠| tensorflow-cpu | 2019-04-24T17:29:00Z | 2021-08-27T03:22:22.500832Z |
| pysec-2019-229 |
|
Invalid memory access and/or a heap buffer overflow in the TensorFlow XLA compiler in Goo⦠| tensorflow-gpu | 2019-04-24T17:29:00Z | 2021-12-09T06:35:11.612649Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| MAL-2022-6980 | Malicious code in vso-service-worker (npm) | 2022-06-13T05:46:01Z | 2022-06-13T05:46:01Z |
| MAL-2022-6981 | Malicious code in vso-service-worker-client (npm) | 2022-06-13T05:46:01Z | 2022-06-13T05:46:01Z |
| MAL-2022-6982 | Malicious code in vso-splash-screen-terminals (npm) | 2022-06-13T05:46:01Z | 2022-06-13T05:46:01Z |
| MAL-2022-6984 | Malicious code in vso-workbench (npm) | 2022-06-13T05:46:01Z | 2022-06-13T05:46:01Z |
| mal-2022-6980 | Malicious code in vso-service-worker (npm) | 2022-06-13T05:46:01Z | 2022-06-13T05:46:01Z |
| mal-2022-6981 | Malicious code in vso-service-worker-client (npm) | 2022-06-13T05:46:01Z | 2022-06-13T05:46:01Z |
| mal-2022-6982 | Malicious code in vso-splash-screen-terminals (npm) | 2022-06-13T05:46:01Z | 2022-06-13T05:46:01Z |
| mal-2022-6984 | Malicious code in vso-workbench (npm) | 2022-06-13T05:46:01Z | 2022-06-13T05:46:01Z |
| MAL-2022-3656 | Malicious code in holvi-validation (npm) | 2022-06-13T05:47:59Z | 2022-06-13T05:48:00Z |
| MAL-2022-7411 | Malicious code in zomato-ui (npm) | 2022-06-13T05:47:59Z | 2022-06-13T05:48:00Z |
| mal-2022-3656 | Malicious code in holvi-validation (npm) | 2022-06-13T05:47:59Z | 2022-06-13T05:48:00Z |
| mal-2022-7411 | Malicious code in zomato-ui (npm) | 2022-06-13T05:47:59Z | 2022-06-13T05:48:00Z |
| MAL-2022-2334 | Malicious code in dashboard-modules (npm) | 2022-06-13T05:48:00Z | 2022-06-13T05:48:00Z |
| MAL-2022-5251 | Malicious code in paytm-kafka-rest (npm) | 2022-06-13T05:48:00Z | 2022-06-13T05:48:00Z |
| MAL-2022-5510 | Malicious code in ptmproc (npm) | 2022-06-13T05:48:00Z | 2022-06-13T05:48:00Z |
| mal-2022-2334 | Malicious code in dashboard-modules (npm) | 2022-06-13T05:48:00Z | 2022-06-13T05:48:00Z |
| mal-2022-5251 | Malicious code in paytm-kafka-rest (npm) | 2022-06-13T05:48:00Z | 2022-06-13T05:48:00Z |
| mal-2022-5510 | Malicious code in ptmproc (npm) | 2022-06-13T05:48:00Z | 2022-06-13T05:48:00Z |
| MAL-2022-667 | Malicious code in @transaction-history/ui-components (npm) | 2022-06-13T05:48:50Z | 2022-06-13T05:48:50Z |
| mal-2022-667 | Malicious code in @transaction-history/ui-components (npm) | 2022-06-13T05:48:50Z | 2022-06-13T05:48:50Z |
| MAL-2022-3301 | Malicious code in gd-activity-tracker (npm) | 2022-06-13T05:49:05Z | 2022-06-13T05:49:05Z |
| mal-2022-3301 | Malicious code in gd-activity-tracker (npm) | 2022-06-13T05:49:05Z | 2022-06-13T05:49:05Z |
| MAL-2022-5606 | Malicious code in rc-trigger-popup (npm) | 2022-06-13T05:49:37Z | 2022-06-13T05:49:38Z |
| mal-2022-5606 | Malicious code in rc-trigger-popup (npm) | 2022-06-13T05:49:37Z | 2022-06-13T05:49:38Z |
| MAL-2022-5123 | Malicious code in orion-web (npm) | 2022-06-13T05:49:55Z | 2022-06-13T05:49:56Z |
| mal-2022-5123 | Malicious code in orion-web (npm) | 2022-06-13T05:49:55Z | 2022-06-13T05:49:56Z |
| MAL-2022-616 | Malicious code in @strava/clio (npm) | 2022-06-13T05:50:27Z | 2022-06-13T05:50:33Z |
| mal-2022-616 | Malicious code in @strava/clio (npm) | 2022-06-13T05:50:27Z | 2022-06-13T05:50:33Z |
| MAL-2022-828 | Malicious code in acronis-ui-kit (npm) | 2022-06-13T05:50:43Z | 2022-06-13T05:50:44Z |
| mal-2022-828 | Malicious code in acronis-ui-kit (npm) | 2022-06-13T05:50:43Z | 2022-06-13T05:50:44Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2023-0624 | ImageMagick: Schwachstelle ermΓΆglicht Denial of Service | 2020-10-22T22:00:00.000+00:00 | 2024-10-14T22:00:00.000+00:00 |
| wid-sec-w-2024-0090 | Red Hat Software Collections: Schwachstelle ermΓΆglicht XXE | 2020-10-22T22:00:00.000+00:00 | 2024-01-15T23:00:00.000+00:00 |
| wid-sec-w-2023-1547 | Eclipse Jetty: Schwachstelle ermΓΆglicht Umgehen von Sicherheitsvorkehrungen | 2020-10-25T23:00:00.000+00:00 | 2024-06-03T22:00:00.000+00:00 |
| wid-sec-w-2023-0174 | Samba: Mehrere Schwachstellen | 2020-10-28T23:00:00.000+00:00 | 2024-04-22T22:00:00.000+00:00 |
| wid-sec-w-2022-1270 | QEMU: Schwachstellen ermΓΆglichen Denial of Service | 2020-11-02T23:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2022-0193 | Red Hat Enterprise Linux: Mehrere Schwachstellen | 2020-11-03T23:00:00.000+00:00 | 2023-09-27T22:00:00.000+00:00 |
| wid-sec-w-2024-1801 | SaltStack Salt: Mehrere Schwachstellen | 2020-11-03T23:00:00.000+00:00 | 2025-01-06T23:00:00.000+00:00 |
| wid-sec-w-2024-3161 | OpenLDAP: Schwachstelle ermΓΆglicht Denial of Service | 2020-11-03T23:00:00.000+00:00 | 2024-10-14T22:00:00.000+00:00 |
| wid-sec-w-2023-0557 | python-cryptography: Schwachstelle ermΓΆglicht Umgehen von Sicherheitsvorkehrungen | 2020-11-04T23:00:00.000+00:00 | 2025-04-09T22:00:00.000+00:00 |
| wid-sec-w-2022-1481 | MIT Kerberos: Schwachstelle ermΓΆglicht Denial of Service | 2020-11-05T23:00:00.000+00:00 | 2023-01-11T23:00:00.000+00:00 |
| wid-sec-w-2022-0999 | Intel Prozessoren: Mehrere Schwachstellen ermΓΆglichen Offenlegung von Informationen | 2020-11-10T23:00:00.000+00:00 | 2023-12-20T23:00:00.000+00:00 |
| wid-sec-w-2023-1966 | X.Org X11: Schwachstelle ermΓΆglicht Privilegieneskalation | 2020-11-10T23:00:00.000+00:00 | 2023-08-03T22:00:00.000+00:00 |
| wid-sec-w-2024-0479 | Intel Ethernet Controller: Mehrere Schwachstellen | 2020-11-10T23:00:00.000+00:00 | 2024-02-26T23:00:00.000+00:00 |
| wid-sec-w-2022-1383 | PostgreSQL: Mehrere Schwachstellen | 2020-11-12T23:00:00.000+00:00 | 2024-12-23T23:00:00.000+00:00 |
| wid-sec-w-2022-2392 | Linux Kernel: Schwachstelle ermΓΆglicht Umgehen von Sicherheitsvorkehrungen | 2020-11-16T23:00:00.000+00:00 | 2022-12-22T23:00:00.000+00:00 |
| wid-sec-w-2022-0493 | Linux Kernel: Schwachstelle ermΓΆglicht Offenlegung von Informationen | 2020-11-17T23:00:00.000+00:00 | 2022-12-20T23:00:00.000+00:00 |
| wid-sec-w-2024-1938 | Drupal: Schwachstelle ermΓΆglicht AusfΓΌhren von beliebigem Programmcode mit den Rechten des Dienstes | 2020-11-18T23:00:00.000+00:00 | 2024-09-03T22:00:00.000+00:00 |
| wid-sec-w-2024-2037 | Perl: Mehrere Schwachstellen ermΓΆglichen Offenlegung von Informationen | 2020-11-19T23:00:00.000+00:00 | 2025-01-28T23:00:00.000+00:00 |
| wid-sec-w-2024-1036 | xpdf: Schwachstelle ermΓΆglicht Denial of Service | 2020-11-22T23:00:00.000+00:00 | 2024-05-06T22:00:00.000+00:00 |
| wid-sec-w-2022-1911 | Red Hat JBoss Enterprise Application Platform: Schwachstelle ermΓΆglicht SQL-Injection | 2020-11-23T23:00:00.000+00:00 | 2024-06-24T22:00:00.000+00:00 |
| wid-sec-w-2022-2241 | mutt: Schwachstelle ermΓΆglicht Offenlegung von Informationen | 2020-11-23T23:00:00.000+00:00 | 2025-01-15T23:00:00.000+00:00 |
| wid-sec-w-2023-0005 | Cacti RRDtool: Schwachstelle ermΓΆglicht Cross-Site Scripting | 2020-11-23T23:00:00.000+00:00 | 2023-01-01T23:00:00.000+00:00 |
| wid-sec-w-2022-1443 | Drupal: Schwachstelle ermΓΆglicht AusfΓΌhren von beliebigem Programmcode mit den Rechten des Dienstes | 2020-11-25T23:00:00.000+00:00 | 2024-09-03T22:00:00.000+00:00 |
| wid-sec-w-2022-1271 | QEMU: Mehrere Schwachstellen ermΓΆglichen Offenlegung von Informationen | 2020-11-29T23:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2023-2783 | Eclipse Jetty: Schwachstelle ermΓΆglicht Manipulation | 2020-11-29T23:00:00.000+00:00 | 2024-05-16T22:00:00.000+00:00 |
| wid-sec-w-2022-1272 | QEMU: Schwachstelle ermΓΆglicht Denial of Service | 2020-11-30T23:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2022-1273 | QEMU: Schwachstelle ermΓΆglicht Denial of Service | 2020-12-01T23:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2023-0623 | ImageMagick: Schwachstelle ermΓΆglicht AusfΓΌhren von beliebigem Programmcode mit den Rechten des Dienstes | 2020-12-02T23:00:00.000+00:00 | 2023-03-12T23:00:00.000+00:00 |
| wid-sec-w-2023-2466 | Apache Tomcat: Schwachstelle ermΓΆglicht Offenlegung von Informationen | 2020-12-03T23:00:00.000+00:00 | 2023-09-27T22:00:00.000+00:00 |
| wid-sec-w-2023-2947 | Docker und Kubernetes: Schwachstelle ermΓΆglicht Privilegieneskalation | 2020-12-03T23:00:00.000+00:00 | 2023-11-16T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-17-283-01 | LAVA Computer MFG Inc. Ether-Serial Link | 2017-10-10T00:00:00.000000Z | 2017-10-10T00:00:00.000000Z |
| icsa-17-283-02 | JanTek JTC-200 | 2017-10-10T00:00:00.000000Z | 2017-10-10T00:00:00.000000Z |
| icsa-17-285-01 | ProMinent MultiFLEX M10a Controller | 2017-10-12T00:00:00.000000Z | 2017-10-12T00:00:00.000000Z |
| icsa-17-285-02 | WECON Technology Co., Ltd. LeviStudio HMI Editor | 2017-10-12T00:00:00.000000Z | 2017-10-12T00:00:00.000000Z |
| icsa-17-285-03 | Envitech Ltd. EnviDAS Ultimate | 2017-10-12T00:00:00.000000Z | 2017-10-12T00:00:00.000000Z |
| icsa-17-285-04a | NXP Semiconductors MQX RTOS (Update A) | 2017-10-12T00:00:00.000000Z | 2018-02-01T00:00:00.000000Z |
| icsa-17-285-05 | Siemens BACnet Field Panels (Update A) | 2017-10-12T00:00:00.000000Z | 2022-06-14T00:00:00.000000Z |
| icsa-17-290-01 | Progea Movicon SCADA/HMI | 2017-10-17T00:00:00.000000Z | 2017-10-17T00:00:00.000000Z |
| icsa-17-292-01 | SpiderControl MicroBrowser | 2017-10-19T00:00:00.000000Z | 2017-10-19T00:00:00.000000Z |
| icsma-17-292-01 | ICSMA-17-292-01_Boston Scientific ZOOM LATITUDE PRM Vulnerabilities | 2017-10-19T00:00:00.000000Z | 2017-10-19T00:00:00.000000Z |
| icsa-17-299-01 | Korenix JetNet | 2017-10-26T00:00:00.000000Z | 2017-10-26T00:00:00.000000Z |
| icsa-17-299-02 | Rockwell Automation Stratix 5100 (Update A) | 2017-10-26T00:00:00.000000Z | 2018-11-01T00:00:00.000000Z |
| icsa-17-304-01 | ABB FOX515T | 2017-10-31T00:00:00.000000Z | 2017-10-31T00:00:00.000000Z |
| icsa-17-304-02 | Trihedral Engineering Limited VTScada | 2017-10-31T00:00:00.000000Z | 2017-10-31T00:00:00.000000Z |
| icsa-17-306-01 | Siemens SIMATIC PCS 7 (Update A) | 2017-11-02T00:00:00.000000Z | 2018-06-12T00:00:00.000000Z |
| icsa-17-306-02 | Advantech WebAccess | 2017-11-02T00:00:00.000000Z | 2017-11-02T00:00:00.000000Z |
| icsa-17-313-01 | AutomationDirect CLICK, C-More, C-More Micro, Do-more Designer, GS Drives, SL-Soft SOLO, DirectSOFT (Update B) | 2017-11-09T00:00:00.000000Z | 2018-07-24T00:00:00.000000Z |
| icsa-17-313-02 | Schneider Electric InduSoft Web Studio and InTouch Machine Edition | 2017-11-09T00:00:00.000000Z | 2017-11-09T00:00:00.000000Z |
| icsa-17-318-01 | ICSA-17-318-01_Siemens SCALANCE, SIMATIC, RUGGEDCOM, and SINAMICS Products (Update F) | 2017-11-14T00:00:00.000000Z | 2019-04-09T00:00:00.000000Z |
| icsa-17-318-02a | ABB TropOS (Update A) | 2017-11-14T00:00:00.000000Z | 2018-02-15T00:00:00.000000Z |
| icsma-17-318-01 | Philips IntelliSpace Cardiovascular System and Xcelera System Vulnerability | 2017-11-14T00:00:00.000000Z | 2017-11-14T00:00:00.000000Z |
| icsa-17-320-01 | Moxa NPort 5110, 5130, and 5150 | 2017-11-16T00:00:00.000000Z | 2017-11-16T00:00:00.000000Z |
| icsa-17-320-02 | Siemens SICAM | 2017-11-16T00:00:00.000000Z | 2017-11-16T00:00:00.000000Z |
| icsa-17-332-01 | Siemens SCALANCE W1750D, M800, S615, and RUGGEDCOM RM1224 (Update C) | 2017-11-17T00:00:00.000000Z | 2018-05-09T00:00:00.000000Z |
| icsa-17-325-01 | PHOENIX CONTACT WLAN Capable Devices using the WPA2 Protocol | 2017-11-21T00:00:00.000000Z | 2017-11-21T00:00:00.000000Z |
| icsa-17-339-01 | Siemens Industrial Products (Update S) | 2017-11-23T00:00:00.000000Z | 2024-07-09T00:00:00.000000Z |
| icsma-17-332-01 | Ethicon Endo-Surgery Generator G11 Vulnerability | 2017-11-28T00:00:00.000000Z | 2017-11-28T00:00:00.000000Z |
| icsa-17-334-01 | Siemens SWT3000 | 2017-11-30T00:00:00.000000Z | 2017-11-30T00:00:00.000000Z |
| icsa-17-334-02 | GEOVAP Reliance SCADA | 2017-11-30T00:00:00.000000Z | 2017-11-30T00:00:00.000000Z |
| icsa-17-341-01 | Xiongmai Technology IP Cameras and DVRs | 2017-12-07T00:00:00.000000Z | 2017-12-07T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-20190515-sb-snmpdos | Cisco Small Business Series Switches Simple Network Management Protocol Denial of Service Vulnerability | 2019-05-15T16:00:00+00:00 | 2019-05-15T16:00:00+00:00 |
| cisco-sa-20190515-sb300sms-dhcp | Cisco Small Business 300 Series Managed Switches DHCP Denial of Service Vulnerability | 2019-05-15T16:00:00+00:00 | 2019-05-15T16:00:00+00:00 |
| cisco-sa-20190515-webex-player | Cisco Webex Network Recording Player Arbitrary Code Execution Vulnerabilities | 2019-05-15T16:00:00+00:00 | 2019-05-15T16:00:00+00:00 |
| cisco-sa-20190515-nxos-cli-bypass | Cisco NX-OS Software CLI Bypass to Internal Service Vulnerability | 2019-05-16T16:00:00+00:00 | 2021-05-19T20:31:16+00:00 |
| cisco-sa-20190605-cucm-imp-dos | Cisco Unified Communications Manager IM&P Service, Cisco TelePresence VCS, and Cisco Expressway Series Denial of Service Vulnerability | 2019-06-05T16:00:00+00:00 | 2019-06-24T13:49:49+00:00 |
| cisco-sa-20190605-ece-xss | Cisco Enterprise Chat and Email Cross-Site Scripting Vulnerability | 2019-06-05T16:00:00+00:00 | 2019-06-05T16:00:00+00:00 |
| cisco-sa-20190605-ind-csrf | Cisco Industrial Network Director Cross-Site Request Forgery Vulnerability | 2019-06-05T16:00:00+00:00 | 2019-06-11T19:14:15+00:00 |
| cisco-sa-20190605-ind-rce | Cisco Industrial Network Director Remote Code Execution Vulnerability | 2019-06-05T16:00:00+00:00 | 2019-06-05T16:00:00+00:00 |
| cisco-sa-20190605-ind-xss | Cisco Industrial Network Director Stored Cross-Site Scripting Vulnerability | 2019-06-05T16:00:00+00:00 | 2019-06-05T16:00:00+00:00 |
| cisco-sa-20190605-iosxr-ssh | Cisco IOS XR Software Secure Shell Authentication Vulnerability | 2019-06-05T16:00:00+00:00 | 2019-06-05T16:00:00+00:00 |
| cisco-sa-20190605-vcs | Cisco TelePresence Video Communication Server and Cisco Expressway Series Server-Side Request Forgery Vulnerability | 2019-06-05T16:00:00+00:00 | 2019-06-05T16:00:00+00:00 |
| cisco-sa-20190605-webexmeetings-id | Cisco Webex Meetings Server Information Disclosure Vulnerability | 2019-06-05T16:00:00+00:00 | 2019-06-05T16:00:00+00:00 |
| cisco-sa-20190612-iosxe-csrf | Cisco IOS XE Software Web UI Cross-Site Request Forgery Vulnerability | 2019-06-12T16:00:00+00:00 | 2019-07-16T15:51:20+00:00 |
| cisco-sa-20190619-cimc-cli-cmdinj | Cisco Integrated Management Controller CLI Command Injection Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| cisco-sa-20190619-cms-codex | Cisco Meeting Server CLI Command Injection Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| cisco-sa-20190619-csm-xml | Cisco Security Manager XML Entity Expansion Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| cisco-sa-20190619-dnac-bypass | Cisco DNA Center Authentication Bypass Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-27T17:34:37+00:00 |
| cisco-sa-20190619-ecea-dwnload | Cisco Enterprise Chat and Email Attachment Download Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| cisco-sa-20190619-esa-bypass | Cisco Email Security Appliance GZIP Content Filter Bypass Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| cisco-sa-20190619-imc-csrf | Cisco Integrated Management Controller Cross-Site Request Forgery Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| cisco-sa-20190619-imc-dos | Cisco Integrated Management Controller Denial of Service Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| cisco-sa-20190619-imc-filewrite | Cisco Integrated Management Controller Arbitrary File Write Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| cisco-sa-20190619-imc-frmwr-dos | Cisco Integrated Management Controller Denial of Service Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| cisco-sa-20190619-imc-infodiscl | Cisco Integrated Management Controller Information Disclosure Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| cisco-sa-20190619-imc-infodisclos | Cisco Integrated Management Controller Information Disclosure Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| cisco-sa-20190619-prime-privescal | Cisco Prime Infrastructure and Evolved Programmable Network Manager Virtual Domain Privilege Escalation Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-07-03T15:48:44+00:00 |
| cisco-sa-20190619-psc-csrf | Cisco Prime Service Catalog Cross-Site Request Forgery Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-20T15:37:52+00:00 |
| cisco-sa-20190619-psc-xss | Cisco Prime Service Catalog Cross-Site Scripting Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-20T15:39:29+00:00 |
| cisco-sa-20190619-rv-dos | Cisco RV110W, RV130W, and RV215W Routers Denial of Service Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| cisco-sa-20190619-rv-fileaccess | Cisco RV110W, RV130W, and RV215W Routers Unauthenticated syslog File Access Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2020-26159 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Further investigation showed that it was not a security issue. Notes: none | 2020-09-02T00:00:00.000Z | 2025-10-01T23:11:05.000Z |
| msrc_cve-2020-26160 | jwt-go before 4.0.0-preview1 allows attackers to bypass intended access restrictions in situations with []string{} for m["aud"] (which is allowed by the specification). Because the type assertion fails "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check. | 2020-09-02T00:00:00.000Z | 2026-02-18T01:18:04.000Z |
| msrc_cve-2020-11979 | As mitigation for CVE-2020-1945 Apache Ant 1.10.8 changed the permissions of temporary files it created so that only the current user was allowed to access them. Unfortunately the fixcrlf task deleted the temporary file and created a new one without said protection effectively nullifying the effort. This would still allow an attacker to inject modified source files into the build process. | 2020-10-02T00:00:00.000Z | 2020-10-14T00:00:00.000Z |
| msrc_cve-2020-14323 | A null pointer dereference flaw was found in samba's Winbind service in versions before 4.11.15 before 4.12.9 and before 4.13.1. A local user could use this flaw to crash the winbind service causing denial of service. | 2020-10-02T00:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2020-14765 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 5.6.49 and prior 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14769 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.6.49 and prior 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14771 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: LDAP Auth). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.2 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14773 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14775 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14776 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14777 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14785 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14786 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-23T00:00:00.000Z |
| msrc_cve-2020-14789 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-23T00:00:00.000Z |
| msrc_cve-2020-14790 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14791 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.2 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14793 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.6.49 and prior 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14794 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14800 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14804 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14809 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14812 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Locking). Supported versions that are affected are 5.6.49 and prior 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14814 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14821 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-23T00:00:00.000Z |
| msrc_cve-2020-14827 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: LDAP Auth). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N). | 2020-10-02T00:00:00.000Z | 2020-10-23T00:00:00.000Z |
| msrc_cve-2020-14828 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.2 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14829 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14830 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14836 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14837 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2026-0032 | Kwetsbaarheden verholpen in Oracle MySQL | 2026-01-21T10:12:24.844869Z | 2026-01-21T10:12:24.844869Z |
| ncsc-2026-0033 | Kwetsbaarheid verholpen in GNU Inetutils telnetd | 2026-01-21T14:15:46.424529Z | 2026-01-21T14:15:46.424529Z |
| ncsc-2026-0034 | Kwetsbaarheden verholpen in Atlassian producten | 2026-01-22T09:03:42.667958Z | 2026-01-22T09:03:42.667958Z |
| ncsc-2026-0035 | Kwetsbaarheid verholpen in Palo Alto Networks PAN-OS | 2026-01-22T09:22:36.433609Z | 2026-01-22T09:22:36.433609Z |
| ncsc-2026-0036 | Kwetsbaarheden verholpen in Cisco Unified Communications producten | 2026-01-22T09:49:39.156365Z | 2026-01-22T09:49:39.156365Z |
| ncsc-2026-0037 | Kwetsbaarheden verholpen in GitLab Community Edition en Enterprise Edition | 2026-01-22T12:35:30.505659Z | 2026-01-22T12:35:30.505659Z |
| ncsc-2026-0038 | Kwetsbaarheid verholpen in BIND 9 | 2026-01-23T08:54:43.506215Z | 2026-01-23T08:54:43.506215Z |
| ncsc-2026-0039 | ZeroDay kwetsbaarheid verholpen in Microsoft Office | 2026-01-27T07:27:52.867415Z | 2026-01-27T07:27:52.867415Z |
| ncsc-2026-0040 | Kwetsbaarheid verholpen in SmarterTools SmarterMail | 2026-01-27T10:51:39.476320Z | 2026-02-06T09:25:57.008166Z |
| ncsc-2026-0041 | Kwetsbaarheid verholpen in Fortinet producten | 2026-01-28T09:32:41.752905Z | 2026-01-28T09:32:41.752905Z |
| ncsc-2026-0042 | Kwetsbaarheden verholpen in SolarWinds Web Help Desk | 2026-01-28T16:37:21.114054Z | 2026-02-02T09:47:54.857445Z |
| ncsc-2026-0043 | Zeroday-kwetsbaarheden verholpen in Ivanti Endpoint Manager Mobile | 2026-01-29T19:15:04.575371Z | 2026-02-20T14:47:02.047999Z |
| ncsc-2026-0044 | Kwetsbaarheid verholpen in Cisco TelePresence Collaboration Endpoint | 2026-02-06T09:20:11.629058Z | 2026-02-06T09:20:11.629058Z |
| ncsc-2026-0045 | Kwetsbaarheid verholpen in Cisco Meeting Management | 2026-02-06T09:22:16.831778Z | 2026-02-06T09:22:16.831778Z |
| ncsc-2026-0046 | Kwetsbaarheden verholpen in Samsung mobile | 2026-02-09T07:48:28.751473Z | 2026-02-09T07:48:28.751473Z |
| ncsc-2026-0047 | Kwetsbaarheid verholpen in Fortinet FortiClient EMS | 2026-02-09T10:16:18.048622Z | 2026-03-30T11:36:22.656910Z |
| ncsc-2026-0048 | Kwetsbaarheid verholpen in BeyondTrust Remote Support | 2026-02-09T10:27:57.867529Z | 2026-02-13T12:54:32.614217Z |
| ncsc-2026-0049 | Kwetsbaarheden verholpen in n8n | 2026-02-09T10:39:40.792744Z | 2026-02-09T10:39:40.792744Z |
| ncsc-2026-0050 | Kwetsbaarheid verholpen in PEAR | 2026-02-09T10:41:43.856342Z | 2026-02-09T10:41:43.856342Z |
| ncsc-2026-0051 | Kwetsbaarheden verholpen in Siemens producten | 2026-02-10T12:27:40.637581Z | 2026-02-10T12:27:40.637581Z |
| ncsc-2026-0052 | Kwetsbaarheden verholpen in SAP producten | 2026-02-10T12:28:40.531069Z | 2026-02-10T12:28:40.531069Z |
| ncsc-2026-0053 | Kwetsbaarheden verholpen in Microsoft Windows | 2026-02-10T19:01:45.561771Z | 2026-02-10T19:01:45.561771Z |
| ncsc-2026-0054 | Kwetsbaarheid verholpen in Microsoft Exchange | 2026-02-10T19:04:51.366294Z | 2026-02-10T19:04:51.366294Z |
| ncsc-2026-0055 | Kwetsbaarheid verholpen in Microsoft SQL Server | 2026-02-10T19:05:45.729972Z | 2026-02-10T19:05:45.729972Z |
| ncsc-2026-0056 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2026-02-10T19:07:16.028511Z | 2026-02-10T19:07:16.028511Z |
| ncsc-2026-0057 | Kwetsbaarheden verholpen in Microsoft Azure | 2026-02-10T19:08:27.878305Z | 2026-02-10T19:08:27.878305Z |
| ncsc-2026-0058 | Kwetsbaarheden verholpen in Microsoft Office | 2026-02-10T19:11:42.825147Z | 2026-02-10T19:11:42.825147Z |
| ncsc-2026-0059 | Kwetsbaarheden verholpen in Ivanti Endpoint Manager | 2026-02-11T08:16:27.583936Z | 2026-03-10T14:20:48.176282Z |
| ncsc-2026-0060 | Kwetsbaarheden verholpen in Fortinet FortiSandbox, FortiAuthenticator en FortiClient | 2026-02-11T11:34:36.684955Z | 2026-02-11T11:34:36.684955Z |
| ncsc-2026-0061 | Kwetsbaarheden verholpen in Fortinet FortiOS | 2026-02-11T11:34:50.888067Z | 2026-02-11T11:34:50.888067Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:20126-1 | Security update for java-21-openjdk | 2026-01-28T16:43:12Z | 2026-01-28T16:43:12Z |
| opensuse-su-2026:10111-1 | gio-branding-upstream-2.86.3-3.1 on GA media | 2026-01-29T00:00:00Z | 2026-01-29T00:00:00Z |
| opensuse-su-2026:10112-1 | dirmngr-2.5.17-1.1 on GA media | 2026-01-29T00:00:00Z | 2026-01-29T00:00:00Z |
| opensuse-su-2026:10113-1 | icinga2-2.15.2-1.1 on GA media | 2026-01-29T00:00:00Z | 2026-01-29T00:00:00Z |
| opensuse-su-2026:10114-1 | logback-1.2.13-2.1 on GA media | 2026-01-29T00:00:00Z | 2026-01-29T00:00:00Z |
| opensuse-su-2026:10115-1 | python311-djangorestframework-3.16.1-2.1 on GA media | 2026-01-29T00:00:00Z | 2026-01-29T00:00:00Z |
| opensuse-su-2026:10116-1 | python311-pypdf-6.6.2-1.1 on GA media | 2026-01-29T00:00:00Z | 2026-01-29T00:00:00Z |
| opensuse-su-2026:10117-1 | python314-3.14.2-2.1 on GA media | 2026-01-29T00:00:00Z | 2026-01-29T00:00:00Z |
| opensuse-su-2026:10118-1 | xen-4.21.0_04-1.1 on GA media | 2026-01-29T00:00:00Z | 2026-01-29T00:00:00Z |
| opensuse-ru-2026:20129-1 | Recommended update for cloud-init | 2026-01-29T10:30:03Z | 2026-01-29T10:30:03Z |
| opensuse-su-2026:20130-1 | Security update for postgresql16 | 2026-01-29T10:55:17Z | 2026-01-29T10:55:17Z |
| opensuse-su-2026:20127-1 | Security update for python-urllib3 | 2026-01-29T14:48:50Z | 2026-01-29T14:48:50Z |
| opensuse-su-2026:20132-1 | Security update for elemental-register, elemental-toolkit | 2026-01-29T15:32:26Z | 2026-01-29T15:32:26Z |
| opensuse-su-2026:20136-1 | Security update for gpg2 | 2026-01-29T16:14:38Z | 2026-01-29T16:14:38Z |
| opensuse-su-2026:20137-1 | Security update for openvpn | 2026-01-29T16:14:38Z | 2026-01-29T16:14:38Z |
| opensuse-su-2026:20133-1 | Security update for glibc | 2026-01-29T17:44:57Z | 2026-01-29T17:44:57Z |
| opensuse-su-2026:20134-1 | Security update for java-17-openjdk | 2026-01-29T17:44:57Z | 2026-01-29T17:44:57Z |
| opensuse-su-2026:10119-1 | ImageMagick-7.1.2.13-2.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10120-1 | MozillaFirefox-147.0.2-1.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10121-1 | chromedriver-144.0.7559.109-1.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10122-1 | fontforge-20251009-4.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10123-1 | freerdp-3.21.0-2.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10124-1 | golang-github-prometheus-prometheus-3.9.1-2.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10125-1 | python311-django-storages-1.14.6-1.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10126-1 | python315-3.15.0~a3-3.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10127-1 | rekor-1.5.0-1.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:20138-1 | Security update for jasper | 2026-01-30T09:59:14Z | 2026-01-30T09:59:14Z |
| opensuse-su-2026:20139-1 | Security update for unbound | 2026-01-30T10:05:07Z | 2026-01-30T10:05:07Z |
| opensuse-su-2026:20142-1 | Security update for libsoup | 2026-01-30T14:27:58Z | 2026-01-30T14:27:58Z |
| opensuse-su-2026:20141-1 | Security update for udisks2 | 2026-01-30T14:30:57Z | 2026-01-30T14:30:57Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2004:041 | Red Hat Security Advisory: slocate security update | 2004-01-26T19:02:00+00:00 | 2025-11-21T17:26:57+00:00 |
| rhsa-2004_041 | Red Hat Security Advisory: slocate security update | 2004-01-26T19:02:00+00:00 | 2024-11-21T22:56:43+00:00 |
| rhsa-2004:031 | Red Hat Security Advisory: netpbm security update | 2004-02-03T08:26:00+00:00 | 2025-11-21T17:26:55+00:00 |
| rhsa-2004:056 | Red Hat Security Advisory: util-linux security update | 2004-02-03T08:26:00+00:00 | 2025-11-21T17:27:00+00:00 |
| rhsa-2004_031 | Red Hat Security Advisory: netpbm security update | 2004-02-03T08:26:00+00:00 | 2024-11-21T22:56:06+00:00 |
| rhsa-2004_056 | Red Hat Security Advisory: util-linux security update | 2004-02-03T08:26:00+00:00 | 2024-11-21T22:57:23+00:00 |
| rhsa-2004:035 | Red Hat Security Advisory: mc security update | 2004-02-03T08:27:00+00:00 | 2025-11-21T17:26:56+00:00 |
| rhsa-2004_035 | Red Hat Security Advisory: mc security update | 2004-02-03T08:27:00+00:00 | 2024-11-21T22:56:30+00:00 |
| rhsa-2004:044 | Red Hat Security Advisory: kernel security update | 2004-02-03T20:06:00+00:00 | 2025-11-21T17:26:58+00:00 |
| rhsa-2004_044 | Red Hat Security Advisory: kernel security update | 2004-02-03T20:06:00+00:00 | 2024-11-21T22:56:48+00:00 |
| rhsa-2004:030 | Red Hat Security Advisory: : Updated NetPBM packages fix multiple temporary file vulnerabilities | 2004-02-05T08:50:00+00:00 | 2025-11-21T17:26:54+00:00 |
| rhsa-2004_030 | Red Hat Security Advisory: : Updated NetPBM packages fix multiple temporary file vulnerabilities | 2004-02-05T08:50:00+00:00 | 2024-11-21T22:56:02+00:00 |
| rhsa-2004:020 | Red Hat Security Advisory: : Updated mailman packages close cross-site scripting vulnerabilities | 2004-02-05T08:51:00+00:00 | 2025-11-21T17:26:53+00:00 |
| rhsa-2004_020 | Red Hat Security Advisory: : Updated mailman packages close cross-site scripting vulnerabilities | 2004-02-05T08:51:00+00:00 | 2024-11-21T22:56:00+00:00 |
| rhsa-2004:045 | Red Hat Security Advisory: gaim security update | 2004-02-09T18:36:00+00:00 | 2026-02-16T19:43:31+00:00 |
| rhsa-2004_045 | Red Hat Security Advisory: gaim security update | 2004-02-09T18:36:00+00:00 | 2024-11-21T22:56:23+00:00 |
| rhsa-2004:019 | Red Hat Security Advisory: mailman security update | 2004-02-09T18:37:00+00:00 | 2025-11-21T17:26:53+00:00 |
| rhsa-2004_019 | Red Hat Security Advisory: mailman security update | 2004-02-09T18:37:00+00:00 | 2024-11-21T22:55:46+00:00 |
| rhsa-2004:050 | Red Hat Security Advisory: mutt security update | 2004-02-11T13:58:00+00:00 | 2025-11-21T17:26:59+00:00 |
| rhsa-2004_050 | Red Hat Security Advisory: mutt security update | 2004-02-11T13:58:00+00:00 | 2024-11-21T22:57:03+00:00 |
| rhsa-2004:051 | Red Hat Security Advisory: : Updated mutt packages fix remotely-triggerable crash | 2004-02-11T13:59:00+00:00 | 2025-11-21T17:26:59+00:00 |
| rhsa-2004_051 | Red Hat Security Advisory: : Updated mutt packages fix remotely-triggerable crash | 2004-02-11T13:59:00+00:00 | 2024-11-21T22:57:06+00:00 |
| rhsa-2004:059 | Red Hat Security Advisory: : Updated XFree86 packages fix privilege escalation vulnerability | 2004-02-13T08:51:00+00:00 | 2025-11-21T17:27:01+00:00 |
| rhsa-2004_059 | Red Hat Security Advisory: : Updated XFree86 packages fix privilege escalation vulnerability | 2004-02-13T08:51:00+00:00 | 2024-11-21T22:57:49+00:00 |
| rhsa-2004:048 | Red Hat Security Advisory: : Updated PWLib packages fix protocol security issues | 2004-02-13T08:52:00+00:00 | 2025-11-21T17:26:58+00:00 |
| rhsa-2004_048 | Red Hat Security Advisory: : Updated PWLib packages fix protocol security issues | 2004-02-13T08:52:00+00:00 | 2024-11-21T22:57:03+00:00 |
| rhsa-2004:060 | Red Hat Security Advisory: XFree86 security update | 2004-02-13T21:14:00+00:00 | 2025-11-21T17:27:01+00:00 |
| rhsa-2004_060 | Red Hat Security Advisory: XFree86 security update | 2004-02-13T21:14:00+00:00 | 2024-11-21T22:57:53+00:00 |
| rhsa-2004:061 | Red Hat Security Advisory: XFree86 security update | 2004-02-13T23:44:00+00:00 | 2025-11-21T17:27:01+00:00 |
| rhsa-2004_061 | Red Hat Security Advisory: XFree86 security update | 2004-02-13T23:44:00+00:00 | 2024-11-21T22:57:57+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-916339 | SSA-916339: Information Disclosure Vulnerability in Apogee PXC and Talon TC Devices | 2025-09-09T00:00:00Z | 2025-09-09T00:00:00Z |
| ssa-062309 | SSA-062309: Information Disclosure Vulnerability in TeleControl Server Basic V3.1 | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-318832 | SSA-318832: SQL Injection Vulnerability in SINEC NMS | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-365200 | SSA-365200: Google Chrome Type Confusion Vulnerability in Siemens Products | 2025-10-14T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-486936 | SSA-486936: Authentication Vulnerability in SIMATIC ET 200SP Communication Processors | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-541582 | SSA-541582: Multiple File Parsing Vulnerabilities in Solid Edge | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-599451 | SSA-599451: Multiple Vulnerabilities in SiPass integrated | 2025-10-14T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-201498 | SSA-201498: Multiple Vulnerabilities in the Web Server of SICAM P850 and SICAM P855 Devices Before V3.11 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-267056 | SSA-267056: Multiple Vulnerabilities in LOGO! 8 BM Devices | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-339694 | SSA-339694: Multiple Vulnerabilities in Spectrum Power 4 Before v4.70 SP12 Security Patch 2 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-365596 | SSA-365596: DLL Hijacking Vulnerability in Siemens Software Center and Solid Edge | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-514895 | SSA-514895: Multiple Vulnerabilities in Altair Grid Engine V2025.1.0 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-522291 | SSA-522291: Improper Certificate Validation Vulnerability in Solid Edge | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-682326 | SSA-682326: Multiple Vulnerabilities in COMOS before V10.4.5 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-190588 | SSA-190588: Cross-Site Scripting Vulnerability in Mendix Rich Text Widget | 2025-11-17T00:00:00Z | 2025-11-17T00:00:00Z |
| ssa-241605 | SSA-241605: Out of Bounds Read in PS/IGES Parasolid Translator Component Before V29.0.258 | 2025-11-17T00:00:00Z | 2025-11-17T00:00:00Z |
| ssa-202008 | SSA-202008: Multiple Vulnerabilities in Ruggedcom Rox Before V2.17.0 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-212953 | SSA-212953: Multiple Vulnerabilities in COMOS | 2025-12-09T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-356310 | SSA-356310: Multiple Vulnerabilities in Gridscale X Prepay | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-416652 | SSA-416652: Multiple Vulnerabilities in SIMATIC CN 4100 Before V4.0.1 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-420375 | SSA-420375: Improper Integrity Check of Firmware Updates in Building X - Security Manager Edge Controller (ACC-AP) | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-471761 | SSA-471761: Multiple Vulnerabilities in SICAM T Before V3.0 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-626856 | SSA-626856: Multiple Vulnerabilities in SINEMA Remote Connect Sever Before V3.2 SP4 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-710408 | SSA-710408: Missing Server Certificate Validation in Siemens Advanced Licensing (SALT) Toolkit | 2025-12-09T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-734261 | SSA-734261: Authentication Bypass Vulnerability in Energy Services Using Elspec G5DFR | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-763474 | SSA-763474: Denial of Service Vulnerability in Ruggedcom ROS devices before V5.10.1 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-868571 | SSA-868571: Missing Server Certificate Validation in IAM Client | 2025-12-09T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-882673 | SSA-882673: Multiple Vulnerabilities in SINEC Security Monitor before V4.10.0 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-912274 | SSA-912274: Multiple Vulnerabilities in RUGGEDCOM ROX Before V2.17 | 2025-12-09T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-915282 | SSA-915282: Denial of service Vulnerability in Interniche IP-Stack based Industrial Devices | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:20981-1 | Security update for kernel-livepatch-MICRO-6-0_Update_5 | 2025-11-05T16:34:28Z | 2025-11-05T16:34:28Z |
| suse-su-2025:3961-1 | Security update for tiff | 2025-11-06T09:19:55Z | 2025-11-06T09:19:55Z |
| suse-su-2025:3964-1 | Security update for java-1_8_0-ibm | 2025-11-06T10:46:49Z | 2025-11-06T10:46:49Z |
| suse-su-2025:3965-1 | Security update for java-1_8_0-ibm | 2025-11-06T10:47:33Z | 2025-11-06T10:47:33Z |
| suse-su-2025:3966-1 | Security update for fetchmail | 2025-11-06T10:48:18Z | 2025-11-06T10:48:18Z |
| suse-su-2025:20971-1 | Security update for tiff | 2025-11-06T11:07:55Z | 2025-11-06T11:07:55Z |
| suse-su-2025:20959-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_2 | 2025-11-06T11:20:15Z | 2025-11-06T11:20:15Z |
| suse-su-2025:20960-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_3 | 2025-11-06T11:20:15Z | 2025-11-06T11:20:15Z |
| suse-su-2025:20991-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_2 | 2025-11-06T11:20:15Z | 2025-11-06T11:20:15Z |
| suse-su-2025:3970-1 | Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP6) | 2025-11-06T12:03:46Z | 2025-11-06T12:03:46Z |
| suse-su-2025:3976-1 | Security update for bind | 2025-11-06T13:14:37Z | 2025-11-06T13:14:37Z |
| suse-su-2025:20994-1 | Security update for the Linux Kernel | 2025-11-06T15:30:43Z | 2025-11-06T15:30:43Z |
| suse-su-2025:3978-1 | Security update for ImageMagick | 2025-11-06T15:43:10Z | 2025-11-06T15:43:10Z |
| suse-su-2025:20996-1 | Security update for the Linux Kernel | 2025-11-06T15:51:37Z | 2025-11-06T15:51:37Z |
| suse-su-2025:3983-1 | Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP6) | 2025-11-06T21:33:47Z | 2025-11-06T21:33:47Z |
| suse-su-2025:3985-1 | Security update for ImageMagick | 2025-11-07T10:30:54Z | 2025-11-07T10:30:54Z |
| suse-su-2025:3986-1 | Security update for gpg2 | 2025-11-07T10:31:06Z | 2025-11-07T10:31:06Z |
| suse-su-2025:3987-1 | Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP7) | 2025-11-07T13:03:43Z | 2025-11-07T13:03:43Z |
| suse-su-2025:3989-1 | Security update for tiff | 2025-11-07T13:44:29Z | 2025-11-07T13:44:29Z |
| suse-su-2025:3995-1 | Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP7) | 2025-11-07T15:33:40Z | 2025-11-07T15:33:40Z |
| suse-su-2025:3996-1 | Security update for java-11-openjdk | 2025-11-07T15:48:31Z | 2025-11-07T15:48:31Z |
| suse-su-2025:3997-1 | Security update for java-17-openjdk | 2025-11-07T15:50:20Z | 2025-11-07T15:50:20Z |
| suse-su-2025:3998-1 | Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP7) | 2025-11-07T16:04:09Z | 2025-11-07T16:04:09Z |
| suse-su-2025:4000-1 | Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP6) | 2025-11-07T17:04:39Z | 2025-11-07T17:04:39Z |
| suse-su-2025:4001-1 | Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP7) | 2025-11-09T01:33:43Z | 2025-11-09T01:33:43Z |
| suse-su-2025:4003-1 | Security update for the Linux Kernel (Live Patch 30 for SLE 15 SP5) | 2025-11-09T05:04:13Z | 2025-11-09T05:04:13Z |
| suse-su-2025:4004-1 | Security update for the Linux Kernel (Live Patch 61 for SLE 15 SP3) | 2025-11-09T07:03:51Z | 2025-11-09T07:03:51Z |
| suse-su-2025:4005-1 | Security update for java-1_8_0-openj9 | 2025-11-10T01:04:17Z | 2025-11-10T01:04:17Z |
| suse-su-2025:4006-1 | Security update for MozillaThunderbird | 2025-11-10T08:00:18Z | 2025-11-10T08:00:18Z |
| suse-su-2025:4031-1 | Security update for the Linux Kernel (Live Patch 27 for SUSE Linux Enterprise 15 SP5) | 2025-11-10T08:12:19Z | 2025-11-10T08:12:19Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2023:0016 | Important: webkit2gtk3 security update | 2023-01-04T00:00:00Z | 2023-03-13T16:36:24Z |
| alsa-2023:0021 | Important: webkit2gtk3 security update | 2023-01-04T00:00:00Z | 2023-03-13T16:36:26Z |
| alsa-2023:0049 | Moderate: grub2 security update | 2023-01-09T00:00:00Z | 2023-01-10T10:17:57Z |
| alsa-2023:0050 | Moderate: nodejs:14 security, bug fix, and enhancement update | 2023-01-09T00:00:00Z | 2023-01-10T10:25:19Z |
| alsa-2023:0077 | Moderate: .NET 6.0 security, bug fix, and enhancement update | 2023-01-11T00:00:00Z | 2023-01-12T19:37:42Z |
| alsa-2023:0079 | Moderate: .NET 6.0 security, bug fix, and enhancement update | 2023-01-11T00:00:00Z | 2023-01-12T19:43:07Z |
| alsa-2023:0087 | Moderate: usbguard security update | 2023-01-12T00:00:00Z | 2023-03-13T16:36:27Z |
| alsa-2023:0089 | Moderate: libreoffice security update | 2023-01-12T00:00:00Z | 2023-01-13T18:11:38Z |
| alsa-2023:0095 | Moderate: libtiff security update | 2023-01-12T00:00:00Z | 2023-03-13T16:36:27Z |
| alsa-2023:0096 | Moderate: dbus security update | 2023-01-12T00:00:00Z | 2023-03-13T16:36:30Z |
| alsa-2023:0099 | Moderate: virt:rhel and virt-devel:rhel security and bug fix update | 2023-01-12T00:00:00Z | 2023-03-13T16:36:36Z |
| alsa-2023:0100 | Moderate: systemd security and bug fix update | 2023-01-12T00:00:00Z | 2023-03-13T16:36:38Z |
| alsa-2023:0101 | Important: kernel security and bug fix update | 2023-01-12T00:00:00Z | 2023-01-16T11:10:17Z |
| alsa-2023:0103 | Moderate: expat security update | 2023-01-12T00:00:00Z | 2023-03-08T11:40:15Z |
| alsa-2023:0110 | Moderate: sqlite security update | 2023-01-12T00:00:00Z | 2023-03-08T11:32:38Z |
| alsa-2023:0113 | Moderate: postgresql:10 security update | 2023-01-12T00:00:00Z | 2023-01-16T11:57:43Z |
| alsa-2023:0114 | Important: kernel-rt security and bug fix update | 2023-01-12T00:00:00Z | 2023-01-16T11:45:22Z |
| alsa-2023:0116 | Moderate: libtasn1 security update | 2023-01-12T00:00:00Z | 2023-03-08T11:21:43Z |
| alsa-2023:0171 | Important: dpdk security update | 2023-01-16T00:00:00Z | 2023-01-16T12:28:07Z |
| alsa-2023:0173 | Moderate: libxml2 security update | 2023-01-16T00:00:00Z | 2023-03-08T11:17:51Z |
| alsa-2023:0192 | Moderate: java-17-openjdk security and bug fix update | 2023-01-18T00:00:00Z | 2023-09-15T13:41:48Z |
| alsa-2023:0200 | Moderate: java-11-openjdk security and bug fix update | 2023-01-18T00:00:00Z | 2023-09-15T13:41:48Z |
| alsa-2023:0202 | Moderate: java-11-openjdk security and bug fix update | 2023-01-18T00:00:00Z | 2023-09-15T13:41:48Z |
| alsa-2023:0194 | Moderate: java-17-openjdk security and bug fix update | 2023-01-23T00:00:00Z | 2023-09-15T13:41:48Z |
| alsa-2023:0282 | Important: sudo security update | 2023-01-23T00:00:00Z | 2023-01-24T07:20:47Z |
| alsa-2023:0284 | Important: sudo security update | 2023-01-23T00:00:00Z | 2023-01-24T07:25:59Z |
| alsa-2023:0285 | Important: firefox security update | 2023-01-23T00:00:00Z | 2023-01-24T07:32:24Z |
| alsa-2023:0288 | Important: firefox security update | 2023-01-23T00:00:00Z | 2023-01-24T07:35:30Z |
| alsa-2023:0300 | Important: kernel-rt security and bug fix update | 2023-01-23T00:00:00Z | 2023-01-24T14:46:25Z |
| alsa-2023:0302 | Moderate: libtiff security update | 2023-01-23T00:00:00Z | 2023-03-13T16:36:47Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2020-1301 | Heap-buffer-overflow in hts_md5_update | 2020-07-22T21:50:04.440116Z | 2022-04-13T03:04:32.327879Z |
| osv-2020-1306 | Use-of-uninitialized-value in TIFFYCbCrtoRGB | 2020-07-22T21:50:04.734490Z | 2022-04-13T03:04:31.082150Z |
| osv-2020-1307 | Heap-buffer-overflow in pcpp::IPv6Extension::getExtensionLen | 2020-07-22T21:50:04.807754Z | 2022-04-13T03:04:38.510475Z |
| osv-2020-1310 | Use-of-uninitialized-value in pcpp::SSLCertificateRequestMessage::SSLCertificateRequestMessage | 2020-07-22T21:50:05.088004Z | 2022-04-13T03:04:38.691127Z |
| osv-2020-1312 | Use-of-uninitialized-value in FilterInput8bitWithStride_c | 2020-07-22T21:50:05.402144Z | 2022-04-13T03:04:37.494474Z |
| osv-2020-1314 | Use-of-uninitialized-value in ndpi_strdup | 2020-07-22T21:50:05.778993Z | 2022-04-13T03:04:36.259727Z |
| osv-2020-1315 | Heap-buffer-overflow in pcpp::IPv4Layer::getFragmentFlags | 2020-07-22T21:50:05.807755Z | 2022-04-13T03:04:38.719461Z |
| osv-2020-1321 | UNKNOWN READ in FlowGetHash | 2020-07-22T21:50:06.291563Z | 2022-04-13T03:04:32.748792Z |
| osv-2020-1325 | Global-buffer-overflow in BEInt<unsigned short, 2>::operator unsigned short | 2020-07-22T21:50:06.762604Z | 2022-04-13T03:04:33.044825Z |
| osv-2020-1326 | Heap-buffer-overflow in ihevcd_parse_slice_data | 2020-07-22T21:50:06.811741Z | 2022-04-13T03:04:30.983191Z |
| osv-2020-1327 | UNKNOWN READ in arrow::Status arrow::VisitArrayInline<arrow::internal::ValidateArrayDataVisitor> | 2020-07-22T21:50:06.904891Z | 2022-04-13T03:04:31.904776Z |
| osv-2020-1328 | UNKNOWN READ in std::__1::__tree<std::__1::__value_type<std::__1::basic_string<char, std::__1::c | 2020-07-22T21:50:06.975630Z | 2022-04-13T03:04:42.691141Z |
| osv-2020-1330 | Heap-buffer-overflow in mu::ParserBase::ParseCmdCodeBulk | 2020-07-22T21:50:07.104906Z | 2022-04-13T03:04:30.741147Z |
| osv-2020-1331 | Heap-buffer-overflow in pcpp::GtpV1Layer::GtpExtension::getNextExtensionHeaderType | 2020-07-22T21:50:07.132825Z | 2022-04-13T03:04:38.628878Z |
| osv-2020-1332 | Index-out-of-bounds in xsltSetAttrVTsegment | 2020-07-22T21:50:07.164634Z | 2022-04-13T03:04:33.752444Z |
| osv-2020-1340 | Use-of-uninitialized-value in Gfx::fillPatch | 2020-07-22T21:50:07.878108Z | 2022-04-13T03:04:37.268795Z |
| osv-2020-1346 | UNKNOWN WRITE in StatsIncr | 2020-07-22T21:50:08.261306Z | 2022-04-13T03:04:32.737543Z |
| osv-2020-1347 | Negative-size-param in fuzz_tlv_to_string | 2020-07-22T21:50:08.310638Z | 2022-04-13T03:04:42.837836Z |
| osv-2020-1349 | Heap-buffer-overflow in mu::ParserBase::ParseCmdCodeBulk | 2020-07-22T21:50:08.481816Z | 2022-04-13T03:04:30.730045Z |
| osv-2020-1351 | Heap-use-after-free in sc_pkcs15_free_object | 2020-07-22T21:50:08.637276Z | 2022-04-13T03:04:41.575360Z |
| osv-2020-1352 | Heap-buffer-overflow in arrow::Status arrow::internal::ValidateArrayVisitor::ValidateListArray<arrow::Li | 2020-07-22T21:50:08.733370Z | 2022-04-13T03:04:31.948799Z |
| osv-2020-1356 | Segv on unknown address in vips_XYZ2Lab_line | 2020-07-24T00:00:05.678188Z | 2022-04-13T03:04:38.042963Z |
| osv-2020-1362 | Use-of-uninitialized-value in LibRaw::init_fuji_block | 2020-07-28T00:00:01.793422Z | 2022-04-15T00:05:54.082034Z |
| osv-2020-1365 | UNKNOWN READ in cli_vba_readdir_new | 2020-07-28T00:00:02.964345Z | 2022-04-13T03:04:39.436925Z |
| osv-2020-1366 | Heap-use-after-free in RDKit::SubstanceGroup::addParentAtomWithBookmark | 2020-07-28T00:00:03.076252Z | 2022-04-13T03:29:38.667934Z |
| osv-2020-1371 | Bad-cast to pcpp::IDnsResource from invalid vptr | 2020-07-28T00:00:04.081926Z | 2022-04-13T03:04:38.585223Z |
| osv-2020-1372 | Index-out-of-bounds in stbi__build_huffman | 2020-07-28T00:00:04.120846Z | 2022-04-13T03:04:40.796838Z |
| osv-2020-1373 | Segv on unknown address in helper_uc_tracecode | 2020-07-28T00:00:04.707812Z | 2023-02-24T01:56:33.315977Z |
| osv-2020-1379 | Heap-buffer-overflow in dotnet_parse_com | 2020-07-28T00:00:05.738705Z | 2022-07-01T00:04:10.449501Z |
| osv-2020-1380 | Use-of-uninitialized-value in stbi__jpeg_decode_block_prog_ac | 2020-07-28T00:00:05.816594Z | 2022-04-13T03:04:40.806471Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2024-0370 | proc-macro-error is unmaintained | 2024-09-01T12:00:00Z | 2024-09-09T12:08:37Z |
| rustsec-2024-0384 | `instant` is unmaintained | 2024-09-01T12:00:00Z | 2024-11-10T13:10:28Z |
| rustsec-2024-0368 | olm-sys: wrapped library unmaintained, potentially vulnerable | 2024-09-02T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0373 | `Endpoint::retry()` calls can lead to panicking | 2024-09-02T12:00:00Z | 2024-09-08T01:47:13Z |
| rustsec-2024-0382 | hwloc is unmaintained | 2024-09-04T12:00:00Z | 2024-11-10T12:52:40Z |
| rustsec-2024-0383 | bcc is unmaintained | 2024-09-04T12:00:00Z | 2024-11-10T12:53:21Z |
| rustsec-2024-0386 | strason is unmaintained | 2024-09-04T12:00:00Z | 2024-11-10T13:16:48Z |
| rustsec-2024-0372 | Memory leak when calling a canister method via `ic_cdk::call` | 2024-09-05T12:00:00Z | 2024-09-07T18:23:36Z |
| rustsec-2024-0371 | gix-path improperly resolves configuration path reported by Git | 2024-09-06T12:00:00Z | 2024-09-07T01:48:33Z |
| rustsec-2024-0443 | webp crate may expose memory contents when encoding an image | 2024-09-06T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0404 | Unsoundness in anstream | 2024-09-08T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0425 | get-size is unmaintained | 2024-09-15T12:00:00Z | 2024-12-22T09:01:06Z |
| rustsec-2024-0427 | get-size-derive is unmaintained | 2024-09-15T12:00:00Z | 2024-12-22T09:01:06Z |
| rustsec-2024-0374 | Segmentation fault due to use of uninitialized memory | 2024-09-22T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0375 | `atty` is unmaintained | 2024-09-25T12:00:00Z | 2024-09-26T12:26:22Z |
| rustsec-2024-0376 | Remotely exploitable Denial of Service in Tonic | 2024-10-01T12:00:00Z | 2025-09-11T07:02:22Z |
| rustsec-2024-0440 | Runtime crash when combining tail calls with stack traces | 2024-10-02T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2024-0439 | Race condition could lead to WebAssembly control-flow integrity and type safety violations | 2024-10-03T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2024-0377 | Heap Buffer overflow using c_chars_to_str function | 2024-10-07T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0436 | paste - no longer maintained | 2024-10-07T12:00:00Z | 2026-01-27T21:51:15Z |
| rustsec-2024-0402 | Borsh serialization of HashMap is non-canonical | 2024-10-11T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0378 | Risk of use-after-free in `borrowed` reads from Python weak references | 2024-10-12T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0380 | Replaced by `pqcrypto-mldsa` | 2024-10-24T12:00:00Z | 2024-11-10T12:05:32Z |
| rustsec-2024-0381 | Replaced by `pqcrypto-mlkem` | 2024-10-24T12:00:00Z | 2024-11-10T12:05:32Z |
| rustsec-2024-0379 | Multiple soundness issues | 2024-10-31T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0438 | Wasmtime doesn't fully sandbox all the Windows device filenames | 2024-11-02T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2024-0445 | cap-primitives doesn't fully sandbox all the Windows device filenames | 2024-11-05T12:00:00Z | 2025-12-19T21:01:24Z |
| rustsec-2024-0401 | Denial of service because of stack overflow with malicious decompression input | 2024-11-14T12:00:00Z | 2024-12-04T12:13:35Z |
| rustsec-2024-0398 | Bias of Polynomial Coefficients in Secret Sharing | 2024-11-16T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0399 | rustls network-reachable panic in `Acceptor::accept` | 2024-11-22T12:00:00Z | 2025-10-28T06:02:18Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-jenkins-2022-20612 | 2024-03-06T10:58:16.486Z | 2025-04-03T14:40:37.652Z | |
| bit-airflow-2022-27949 | Apache Airflow prior to 2.3.1 may include sensitive values in rendered template | 2024-03-06T10:58:17.378Z | 2025-05-20T10:02:07.006Z |
| bit-golang-2022-41717 | Excessive memory growth in net/http and golang.org/x/net/http2 | 2024-03-06T10:58:17.486Z | 2025-05-20T10:02:07.006Z |
| bit-mlflow-2023-43472 | 2024-03-06T10:58:17.282Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2023-4895 | Missing Authorization in GitLab | 2024-03-06T10:58:18.268Z | 2025-05-20T10:02:07.006Z |
| bit-moodle-2023-5541 | Moodle: xss risk when using csv grade import method | 2024-03-06T10:58:18.062Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2023-28112 | Discourse's SSRF protection missing for some FastImage requests | 2024-03-06T10:58:19.088Z | 2026-03-25T18:30:22.404Z |
| bit-mariadb-2022-27458 | 2024-03-06T10:58:21.495Z | 2024-03-06T11:25:28.861Z | |
| bit-nats-2022-24450 | 2024-03-06T10:58:21.477Z | 2025-04-03T14:40:37.652Z | |
| bit-minio-2021-21287 | Server-Side Request Forgery in MinIO Browser API | 2024-03-06T10:58:22.370Z | 2025-05-20T10:02:07.006Z |
| bit-dotnet-2022-24512 | .NET and Visual Studio Remote Code Execution Vulnerability | 2024-03-06T10:58:23.161Z | 2025-05-20T10:02:07.006Z |
| bit-magento-2021-28583 | Magento Commerce insecure storage of sensitive documentation | 2024-03-06T10:58:23.464Z | 2026-03-20T09:47:33.381Z |
| bit-mongodb-2020-7929 | Specially crafted regex query can cause DoS | 2024-03-06T10:58:23.672Z | 2025-05-20T10:02:07.006Z |
| bit-drupal-2020-13665 | 2024-03-06T10:58:25.802Z | 2025-04-03T14:40:37.652Z | |
| bit-grafana-2022-21702 | Cross site scripting in Grafana proxy | 2024-03-06T10:58:26.283Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2022-24288 | Apache Airflow: RCE in example DAGs | 2024-03-06T10:58:27.613Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2021-32777 | Incorrect concatenation of multiple value request headers in ext-authz extension | 2024-03-06T10:58:27.361Z | 2025-05-20T10:02:07.006Z |
| bit-jenkins-2022-2048 | 2024-03-06T10:58:27.765Z | 2025-04-03T14:40:37.652Z | |
| bit-mlflow-2023-4033 | OS Command Injection in mlflow/mlflow | 2024-03-06T10:58:27.677Z | 2025-05-20T10:02:07.006Z |
| bit-moodle-2023-5540 | Moodle: authenticated remote code execution risk in imscp | 2024-03-06T10:58:27.676Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2023-28111 | Discourse vulnerable to SSRF protection bypass possible with IPv4-mapped IPv6 addresses | 2024-03-06T10:58:28.677Z | 2025-05-20T10:02:07.006Z |
| bit-golang-2022-41716 | Unsanitized NUL in environment variables on Windows in syscall and os/exec | 2024-03-06T10:58:28.267Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-4812 | Incorrect Authorization in GitLab | 2024-03-06T10:58:30.571Z | 2025-05-20T10:02:07.006Z |
| bit-mariadb-2022-27457 | 2024-03-06T10:58:30.164Z | 2025-04-03T14:40:37.652Z | |
| bit-minio-2020-11012 | Authentication bypass MinIO Admin API | 2024-03-06T10:58:32.002Z | 2025-05-20T10:02:07.006Z |
| bit-dotnet-2022-24464 | .NET and Visual Studio Denial of Service Vulnerability | 2024-03-06T10:58:33.275Z | 2025-05-20T10:02:07.006Z |
| bit-mongodb-2020-7928 | Improper neutralization of null byte leads to read overrun | 2024-03-06T10:58:33.099Z | 2025-05-20T10:02:07.006Z |
| bit-nats-2021-3127 | 2024-03-06T10:58:33.708Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2020-13664 | 2024-03-06T10:58:34.293Z | 2025-04-03T14:40:37.652Z | |
| bit-mlflow-2023-3765 | Absolute Path Traversal in mlflow/mlflow | 2024-03-06T10:58:35.367Z | 2025-05-20T10:02:07.006Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-bm53321 | attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing | 2026-04-10T00:51:58.426076Z | 2026-04-09T11:53:35Z |
| cleanstart-2026-in87004 | In libexpat before 2 | 2026-04-10T00:52:28.484967Z | 2026-04-09T11:45:48Z |
| cleanstart-2026-ng75665 | During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions | 2026-04-10T00:56:28.527348Z | 2026-04-09T11:53:35Z |
| cleanstart-2026-mu81308 | gRPC-Go is the Go language implementation of gRPC | 2026-04-10T00:56:28.601214Z | 2026-04-09T11:29:32Z |
| cleanstart-2026-nz97711 | gRPC-Go is the Go language implementation of gRPC | 2026-04-10T01:00:58.666965Z | 2026-04-09T09:33:10Z |
| cleanstart-2026-hm40094 | filippo | 2026-04-10T01:03:28.912174Z | 2026-04-09T09:27:45Z |
| cleanstart-2026-nx54250 | During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions | 2026-04-10T01:03:29.003448Z | 2026-04-09T09:59:33Z |
| cleanstart-2026-kl76732 | attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing | 2026-04-10T01:03:58.949308Z | 2026-04-09T09:05:28Z |
| cleanstart-2026-ac01087 | During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions | 2026-04-10T01:03:59.042951Z | 2026-04-09T09:55:12Z |
| cleanstart-2026-dp55969 | Security fixes for ghsa-389x-839f-4rhx, ghsa-3p8m-j85q-pgmj, ghsa-4cx2-fc23-5wg6, ghsa-4g8c-wm8x-jfhw, ghsa-735f-pc8j-v9w8, ghsa-fghv-69vj-qj49, ghsa-prj3-ccx8-p6x4, ghsa-xq3w-v528-46rv applied in versions: 0.12.0-r16 | 2026-04-10T01:04:00.139766Z | 2026-04-09T09:00:58Z |
| cleanstart-2026-aa51484 | Security fixes for ghsa-389x-839f-4rhx, ghsa-3p8m-j85q-pgmj, ghsa-4cx2-fc23-5wg6, ghsa-4g8c-wm8x-jfhw, ghsa-735f-pc8j-v9w8, ghsa-fghv-69vj-qj49, ghsa-prj3-ccx8-p6x4, ghsa-xq3w-v528-46rv applied in versions: 0.12.0-r16 | 2026-04-10T01:04:01.115500Z | 2026-04-09T08:58:26Z |
| cleanstart-2026-jm69747 | Security fixes for ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 25.10.0-r1 | 2026-04-10T01:04:01.248430Z | 2026-04-09T08:55:52Z |
| cleanstart-2026-av56399 | Security fixes for ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 25.10.0-r1 | 2026-04-10T01:04:01.910374Z | 2026-04-09T08:54:48Z |
| cleanstart-2026-oc72960 | attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing | 2026-04-10T01:04:28.955253Z | 2026-04-09T08:54:07Z |
| cleanstart-2026-dm93480 | During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions | 2026-04-10T01:06:00.088585Z | 2026-04-09T09:11:04Z |
| cleanstart-2026-ei21238 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-11T00:37:54.711613Z | 2026-04-10T10:45:58Z |
| cleanstart-2026-lb69194 | In libexpat before 2 | 2026-04-11T00:39:42.680532Z | 2026-04-10T05:48:24Z |
| cleanstart-2026-jt73156 | protojson | 2026-04-11T00:42:17.168521Z | 2026-04-10T12:27:18Z |
| cleanstart-2026-hu81793 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-12T00:36:09.840766Z | 2026-04-11T06:04:40Z |
| cleanstart-2026-mz25894 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-12T00:36:10.207025Z | 2026-04-11T06:04:40Z |
| cleanstart-2026-ne70100 | Security fixes for ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r0, 3.9.4-r6 | 2026-04-12T00:36:10.440964Z | 2026-04-11T06:04:40Z |
| cleanstart-2026-nh62318 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-14T00:38:02.309746Z | 2026-04-13T11:37:38Z |
| cleanstart-2026-ka64649 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-14T00:38:03.199310Z | 2026-04-13T11:37:38Z |
| cleanstart-2026-nj21771 | png_image_free in png | 2026-04-14T00:41:12.278705Z | 2026-04-13T10:08:55Z |
| cleanstart-2026-jh41080 | In libexpat before 2 | 2026-04-14T00:41:12.662437Z | 2026-04-13T11:37:38Z |
| cleanstart-2026-lk73694 | During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions | 2026-04-14T00:43:42.897096Z | 2026-04-13T05:21:32Z |
| cleanstart-2026-fh63386 | When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint | 2026-04-14T00:44:12.807187Z | 2026-04-13T10:06:48Z |
| cleanstart-2026-ec57959 | protojson | 2026-04-15T00:38:38.411296Z | 2026-04-14T11:35:55Z |
| cleanstart-2026-mp87020 | If one side of the TLS connection sends multiple key update messages post-handshake in a single record, the connection can deadlock, causing uncontrolled consumption of resources | 2026-04-15T00:39:08.262212Z | 2026-04-14T11:37:13Z |
| cleanstart-2026-bz28794 | Validating certificate chains which use policies is unexpectedly inefficient when certificates in the chain contain a very large number of policy mappings, possibly causing denial of service | 2026-04-15T00:41:09.072733Z | 2026-04-14T10:03:45Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2024-ALE-006 | [MΓ J] VulnΓ©rabilitΓ© dans Palo Alto Networks GlobalProtect | 2024-04-12T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| certfr-2024-ale-006 | [MΓ J] VulnΓ©rabilitΓ© dans Palo Alto Networks GlobalProtect | 2024-04-12T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| CERTFR-2024-ALE-007 | Multiples vulnΓ©rabilitΓ©s dans les produits Cisco | 2024-04-25T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| certfr-2024-ale-007 | Multiples vulnΓ©rabilitΓ©s dans les produits Cisco | 2024-04-25T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| CERTFR-2024-ALE-008 | [MΓ J] VulnΓ©rabilitΓ© dans les produits Check Point | 2024-05-30T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| certfr-2024-ale-008 | [MΓ J] VulnΓ©rabilitΓ© dans les produits Check Point | 2024-05-30T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| CERTFR-2024-ALE-009 | VulnΓ©rabilitΓ© dans OpenSSH | 2024-07-01T00:00:00.000000 | 2024-07-03T00:00:00.000000 |
| certfr-2024-ale-009 | VulnΓ©rabilitΓ© dans OpenSSH | 2024-07-01T00:00:00.000000 | 2024-07-03T00:00:00.000000 |
| CERTFR-2024-ALE-010 | Multiples vulnΓ©rabilitΓ©s dans Roundcube | 2024-08-09T00:00:00.000000 | 2024-10-07T00:00:00.000000 |
| certfr-2024-ale-010 | Multiples vulnΓ©rabilitΓ©s dans Roundcube | 2024-08-09T00:00:00.000000 | 2024-10-07T00:00:00.000000 |
| CERTFR-2024-ALE-011 | VulnΓ©rabilitΓ© dans SonicWall | 2024-09-10T00:00:00.000000 | 2024-11-21T00:00:00.000000 |
| certfr-2024-ale-011 | VulnΓ©rabilitΓ© dans SonicWall | 2024-09-10T00:00:00.000000 | 2024-11-21T00:00:00.000000 |
| CERTFR-2024-ALE-012 | [MΓ J] VulnΓ©rabilitΓ©s affectant OpenPrinting CUPS | 2024-09-27T00:00:00.000000 | 2024-11-21T00:00:00.000000 |
| certfr-2024-ale-012 | [MΓ J] VulnΓ©rabilitΓ©s affectant OpenPrinting CUPS | 2024-09-27T00:00:00.000000 | 2024-11-21T00:00:00.000000 |
| CERTFR-2024-ALE-014 | [MΓ J] Multiples vulnΓ©rabilitΓ©s dans Fortinet FortiManager | 2024-10-30T00:00:00.000000 | 2024-10-23T00:00:00.000000 |
| certfr-2024-ale-014 | [MΓ J] Multiples vulnΓ©rabilitΓ©s dans Fortinet FortiManager | 2024-10-30T00:00:00.000000 | 2024-10-23T00:00:00.000000 |
| CERTFR-2024-ALE-015 | [MΓ J] Multiples vulnΓ©rabilitΓ©s sur l'interface d'administration des Γ©quipements Palo Alto Networks | 2024-11-15T00:00:00.000000 | 2024-11-18T00:00:00.000000 |
| certfr-2024-ale-015 | [MΓ J] Multiples vulnΓ©rabilitΓ©s sur l'interface d'administration des Γ©quipements Palo Alto Networks | 2024-11-15T00:00:00.000000 | 2024-11-18T00:00:00.000000 |
| CERTFR-2025-ALE-001 | [MΓ J] VulnΓ©rabilitΓ© dans les produits Ivanti | 2025-01-09T00:00:00.000000 | 2025-04-01T00:00:00.000000 |
| certfr-2025-ale-001 | [MΓ J] VulnΓ©rabilitΓ© dans les produits Ivanti | 2025-01-09T00:00:00.000000 | 2025-04-01T00:00:00.000000 |
| CERTFR-2024-ALE-013 | Exploitations de vulnΓ©rabilitΓ©s dans Ivanti Cloud Services Appliance (CSA) | 2025-03-31T00:00:00.000000 | 2024-10-25T00:00:00.000000 |
| certfr-2024-ale-013 | Exploitations de vulnΓ©rabilitΓ©s dans Ivanti Cloud Services Appliance (CSA) | 2025-03-31T00:00:00.000000 | 2024-10-25T00:00:00.000000 |
| CERTFR-2025-ALE-003 | [MΓ J] VulnΓ©rabilitΓ© dans les produits Ivanti | 2025-04-04T00:00:00.000000 | 2025-04-11T00:00:00.000000 |
| certfr-2025-ale-003 | [MΓ J] VulnΓ©rabilitΓ© dans les produits Ivanti | 2025-04-04T00:00:00.000000 | 2025-04-11T00:00:00.000000 |
| CERTFR-2025-ALE-004 | ActivitΓ©s de post-exploitation dans Fortinet FortiGate | 2025-04-11T00:00:00.000000 | 2025-08-07T00:00:00.000000 |
| certfr-2025-ale-004 | ActivitΓ©s de post-exploitation dans Fortinet FortiGate | 2025-04-11T00:00:00.000000 | 2025-08-07T00:00:00.000000 |
| CERTFR-2025-ALE-005 | VulnΓ©rabilitΓ© dans SAP NetWeaver | 2025-04-28T00:00:00.000000 | 2025-06-24T00:00:00.000000 |
| certfr-2025-ale-005 | VulnΓ©rabilitΓ© dans SAP NetWeaver | 2025-04-28T00:00:00.000000 | 2025-06-24T00:00:00.000000 |
| CERTFR-2025-ALE-002 | [MΓ J] VulnΓ©rabilitΓ© dans les produits Fortinet | 2025-05-07T00:00:00.000000 | 2025-01-14T00:00:00.000000 |
| certfr-2025-ale-002 | [MΓ J] VulnΓ©rabilitΓ© dans les produits Fortinet | 2025-05-07T00:00:00.000000 | 2025-01-14T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTA-2002-AVI-101 | Multiples vulnΓ©rabilitΓ©s dans Internet Explorer | 2002-05-16T00:00:00.000000 | 2002-05-16T00:00:00.000000 |
| CERTA-2002-AVI-102 | VulnΓ©rabilitΓ© des commutateurs CSS 11000 de CISCO | 2002-05-16T00:00:00.000000 | 2002-05-16T00:00:00.000000 |
| CERTA-2002-AVI-103 | VulnΓ©rabilitΓ© Cisco Cache Engine et Content Engine | 2002-05-16T00:00:00.000000 | 2002-05-21T00:00:00.000000 |
| certa-2002-avi-101 | Multiples vulnΓ©rabilitΓ©s dans Internet Explorer | 2002-05-16T00:00:00.000000 | 2002-05-16T00:00:00.000000 |
| certa-2002-avi-102 | VulnΓ©rabilitΓ© des commutateurs CSS 11000 de CISCO | 2002-05-16T00:00:00.000000 | 2002-05-16T00:00:00.000000 |
| certa-2002-avi-103 | VulnΓ©rabilitΓ© Cisco Cache Engine et Content Engine | 2002-05-16T00:00:00.000000 | 2002-05-21T00:00:00.000000 |
| CERTA-2002-AVI-104 | VulnΓ©rabilitΓ©s de tcpdump | 2002-05-17T00:00:00.000000 | 2002-05-31T00:00:00.000000 |
| CERTA-2002-AVI-105 | VulnΓ©rabilitΓ©s sur Webmin | 2002-05-17T00:00:00.000000 | 2002-05-17T00:00:00.000000 |
| CERTA-2002-AVI-106 | VulnΓ©rabilitΓ© dans Snitz Forums 2000 | 2002-05-17T00:00:00.000000 | 2002-05-17T00:00:00.000000 |
| certa-2002-avi-104 | VulnΓ©rabilitΓ©s de tcpdump | 2002-05-17T00:00:00.000000 | 2002-05-31T00:00:00.000000 |
| certa-2002-avi-105 | VulnΓ©rabilitΓ©s sur Webmin | 2002-05-17T00:00:00.000000 | 2002-05-17T00:00:00.000000 |
| certa-2002-avi-106 | VulnΓ©rabilitΓ© dans Snitz Forums 2000 | 2002-05-17T00:00:00.000000 | 2002-05-17T00:00:00.000000 |
| CERTA-2002-AVI-107 | VulnΓ©rabilitΓ© Cisco IOS aux dΓ©nis de service de type ICMP Redirect | 2002-05-23T00:00:00.000000 | 2002-05-23T00:00:00.000000 |
| CERTA-2002-AVI-108 | VulnΓ©rabilitΓ© du service ISC DHCPD | 2002-05-23T00:00:00.000000 | 2002-05-31T00:00:00.000000 |
| CERTA-2002-AVI-109 | VulnΓ©rabilitΓ© dans talkd | 2002-05-23T00:00:00.000000 | 2002-06-12T00:00:00.000000 |
| certa-2002-avi-107 | VulnΓ©rabilitΓ© Cisco IOS aux dΓ©nis de service de type ICMP Redirect | 2002-05-23T00:00:00.000000 | 2002-05-23T00:00:00.000000 |
| certa-2002-avi-108 | VulnΓ©rabilitΓ© du service ISC DHCPD | 2002-05-23T00:00:00.000000 | 2002-05-31T00:00:00.000000 |
| certa-2002-avi-109 | VulnΓ©rabilitΓ© dans talkd | 2002-05-23T00:00:00.000000 | 2002-06-12T00:00:00.000000 |
| CERTA-2002-AVI-110 | VulnΓ©rabilitΓ© dans Windows Debugger | 2002-05-24T00:00:00.000000 | 2002-05-24T00:00:00.000000 |
| certa-2002-avi-110 | VulnΓ©rabilitΓ© dans Windows Debugger | 2002-05-24T00:00:00.000000 | 2002-05-24T00:00:00.000000 |
| CERTA-2002-AVI-111 | VulnΓ©rabilitΓ© dans CISCO IDS Device Manager 3.1.1 | 2002-05-27T00:00:00.000000 | 2002-05-27T00:00:00.000000 |
| certa-2002-avi-111 | VulnΓ©rabilitΓ© dans CISCO IDS Device Manager 3.1.1 | 2002-05-27T00:00:00.000000 | 2002-05-27T00:00:00.000000 |
| CERTA-2002-AVI-112 | VulnΓ©rabilitΓ© dans fetchmail | 2002-05-29T00:00:00.000000 | 2002-05-29T00:00:00.000000 |
| certa-2002-avi-112 | VulnΓ©rabilitΓ© dans fetchmail | 2002-05-29T00:00:00.000000 | 2002-05-29T00:00:00.000000 |
| CERTA-2002-AVI-113 | VulnΓ©rabilitΓ© dans JRUN 3.0 et 3.1 | 2002-05-30T00:00:00.000000 | 2002-05-30T00:00:00.000000 |
| CERTA-2002-AVI-114 | VulnΓ©rabilitΓ© dans Microsoft Exchange 2000 | 2002-05-30T00:00:00.000000 | 2002-05-30T00:00:00.000000 |
| certa-2002-avi-113 | VulnΓ©rabilitΓ© dans JRUN 3.0 et 3.1 | 2002-05-30T00:00:00.000000 | 2002-05-30T00:00:00.000000 |
| certa-2002-avi-114 | VulnΓ©rabilitΓ© dans Microsoft Exchange 2000 | 2002-05-30T00:00:00.000000 | 2002-05-30T00:00:00.000000 |
| CERTA-2002-AVI-115 | VulnΓ©rabilitΓ© du serveur wu-imapd | 2002-05-31T00:00:00.000000 | 2002-05-31T00:00:00.000000 |
| certa-2002-avi-115 | VulnΓ©rabilitΓ© du serveur wu-imapd | 2002-05-31T00:00:00.000000 | 2002-05-31T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2011-003295 | JP1/Cm2/Network Node Manager i Denial of Service (DoS) Vulnerability | 2012-01-06T19:51+09:00 | 2012-01-06T19:51+09:00 |
| jvndb-2011-002122 | An authentication information Exposure Vulnerability in JP1/IT Resource Management - Manager | 2012-01-06T19:53+09:00 | 2012-01-06T19:53+09:00 |
| jvndb-2012-000003 | Wibu-Systems CodeMeter Runtime vulnerable to denial-of-service | 2012-01-11T15:02+09:00 | 2012-01-11T15:02+09:00 |
| jvndb-2012-000002 | Cogent DataHub vulnerable to HTTP header injection | 2012-01-11T15:12+09:00 | 2012-01-13T16:08+09:00 |
| jvndb-2012-000001 | Cogent DataHub vulnerable to cross-site scripting | 2012-01-11T15:22+09:00 | 2012-01-13T15:57+09:00 |
| jvndb-2012-000007 | Oracle WebLogic Server vulnerable to cross-site scripting | 2012-01-20T15:37+09:00 | 2012-01-20T15:37+09:00 |
| jvndb-2012-000006 | osCommerce vulnerable to directory traversal | 2012-01-20T16:09+09:00 | 2012-01-20T16:09+09:00 |
| jvndb-2012-000005 | osCommerce vulnerable to cross-site scripting | 2012-01-20T16:15+09:00 | 2012-04-26T16:58+09:00 |
| jvndb-2012-000004 | osCommerce Japanese version vulnerable to cross-site scripting | 2012-01-20T16:23+09:00 | 2012-01-20T16:23+09:00 |
| jvndb-2012-000008 | glucose 2 vulnerable to arbitrary script execution | 2012-01-23T18:27+09:00 | 2012-01-23T18:27+09:00 |
| jvndb-2012-001189 | Hitachi IT Operations Analyzer Cross-Site Scripting Vulnerability | 2012-01-27T10:37+09:00 | 2012-01-27T10:37+09:00 |
| jvndb-2012-001190 | Hitachi IT Operations Director Cross-Site Scripting Vulnerability | 2012-01-27T10:38+09:00 | 2012-01-27T10:38+09:00 |
| jvndb-2012-001191 | Arbitrary Code Execution Vulnerability in Hitachi COBOL2002 | 2012-01-27T10:44+09:00 | 2012-01-27T10:44+09:00 |
| jvndb-2012-000010 | Pocket WiFi (GP02) vulnerable to cross-site request forgery | 2012-02-01T14:12+09:00 | 2012-02-01T14:12+09:00 |
| jvndb-2012-000012 | Apache Struts 2 vulnerable to an arbitrary Java method execution | 2012-02-10T14:29+09:00 | 2012-02-10T14:29+09:00 |
| jvndb-2012-000011 | ALFTP may insecurely load executable files | 2012-02-13T15:58+09:00 | 2012-02-13T15:58+09:00 |
| jvndb-2012-000013 | cforms II vulnerable to cross-site scripting | 2012-02-15T17:14+09:00 | 2012-02-15T17:14+09:00 |
| jvndb-2012-000014 | Multiple COOKPAD applications for Android vulnerable in WebView class | 2012-02-22T14:44+09:00 | 2012-02-29T10:56+09:00 |
| jvndb-2012-000015 | Movable Type vulnerable to cross-site request forgery | 2012-02-23T14:19+09:00 | 2012-02-23T14:19+09:00 |
| jvndb-2012-000016 | Movable Type vulnerable to cross-site scripting | 2012-02-23T14:20+09:00 | 2012-02-23T14:20+09:00 |
| jvndb-2012-000017 | Movable Type vulnerable to OS command injection | 2012-02-23T14:21+09:00 | 2012-02-23T14:21+09:00 |
| jvndb-2012-000018 | Movable Type vulnerable to session hijacking | 2012-02-23T14:28+09:00 | 2012-02-23T14:28+09:00 |
| jvndb-2012-000019 | Kingsoft Internet Security 2011 vulnerable to denial-of-service | 2012-03-01T14:03+09:00 | 2012-03-01T14:03+09:00 |
| jvndb-2012-000020 | ES File Explorer fails to restrict access permissions | 2012-03-05T15:50+09:00 | 2012-03-05T15:50+09:00 |
| jvndb-2012-000021 | SquirrelMail plugin Autocomplete vulnerable to cross-site scripting | 2012-03-09T14:18+09:00 | 2012-03-09T14:18+09:00 |
| jvndb-2012-000022 | Jenkins vulnerable to cross-site scripting | 2012-03-09T14:28+09:00 | 2012-03-09T14:28+09:00 |
| jvndb-2012-000023 | Jenkins vulnerable to cross-site scripting | 2012-03-09T14:35+09:00 | 2012-03-09T14:35+09:00 |
| jvndb-2012-000024 | twicca fails to restrict access permissions | 2012-03-13T13:36+09:00 | 2012-03-13T13:36+09:00 |
| jvndb-2012-000025 | Redmine vulnerable to cross-site scripting | 2012-03-13T13:39+09:00 | 2012-03-13T13:39+09:00 |
| jvndb-2012-001793 | JP1/Cm2/Network Node Manager i Denial of Service (DoS) Vulnerability | 2012-03-19T12:04+09:00 | 2012-03-19T12:04+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2015-00664 | Google Chrome V8ε εη ΄εζΌζ΄ | 2015-01-26 | 2015-01-27 |
| cnvd-2015-00665 | Google Chrome DOMε ειθ――εΌη¨δ»£η ζ§θ‘ζΌζ΄ | 2015-01-26 | 2015-01-27 |
| cnvd-2015-00666 | Google Chrome DOMε ειθ――εΌη¨ζΌζ΄οΌCNVD-2015-00666οΌ | 2015-01-26 | 2015-01-27 |
| cnvd-2015-00667 | Google Chromeζη»ζε‘ζΌζ΄οΌCNVD-2015-00667οΌ | 2015-01-26 | 2015-01-27 |
| cnvd-2015-00668 | Google Chromeζη»ζε‘ζΌζ΄οΌCNVD-2015-00668οΌ | 2015-01-26 | 2015-01-27 |
| cnvd-2015-00669 | Google Chromeζη»ζε‘ζΌζ΄οΌCNVD-2015-00669οΌ | 2015-01-26 | 2015-01-27 |
| cnvd-2015-00670 | Google Chrome WebAudioε ειθ――εΌη¨δ»»ζ代η ζ§θ‘ζΌζ΄ | 2015-01-26 | 2015-01-27 |
| cnvd-2015-00671 | Google Chromeε ειθ――εΌη¨ζΌζ΄οΌCNVD-2015-00671οΌ | 2015-01-26 | 2015-01-27 |
| cnvd-2015-00672 | Google Chromeζη»ζε‘ζΌζ΄οΌCNVD-2015-00672οΌ | 2015-01-26 | 2015-01-27 |
| cnvd-2015-00688 | SAP ERP Dealer PortalζιζεζΌζ΄ | 2015-01-26 | 2015-01-27 |
| cnvd-2015-00689 | OpenStack Glanceζη»ζε‘ζΌζ΄ | 2015-01-26 | 2015-01-27 |
| cnvd-2015-00690 | WordPressζδ»ΆPie Registerεε¨ζͺζζΌζ΄ | 2015-01-26 | 2015-01-27 |
| cnvd-2015-00701 | Google Chrome DOMε ειθ――εΌη¨ζΌζ΄οΌCNVD-2015-00701οΌ | 2015-01-26 | 2015-01-28 |
| cnvd-2015-00702 | Google Chrome DOMε ειθ――εΌη¨ζΌζ΄οΌCNVD-2015-00702οΌ | 2015-01-26 | 2015-01-28 |
| cnvd-2015-00703 | Google Chrome FFmpegε ειθ――εΌη¨ζΌζ΄οΌCNVD-2015-00703οΌ | 2015-01-26 | 2015-01-28 |
| cnvd-2015-00704 | Google Chrome Speechε ειθ――εΌη¨ζΌζ΄ | 2015-01-26 | 2015-01-28 |
| cnvd-2015-00705 | GNU patch 'set_hunkmax()'ε½ζ°ζη»ζε‘ζΌζ΄ | 2015-01-26 | 2015-01-28 |
| cnvd-2015-00706 | Google Chrome FFmpegε ειθ――εΌη¨ζΌζ΄ | 2015-01-26 | 2015-01-28 |
| cnvd-2015-00707 | Google Chrome Viewsε ειθ――εΌη¨ζΌζ΄ | 2015-01-26 | 2015-01-28 |
| cnvd-2015-00708 | Google Chrome SkiaθΆηθ―»ζΌζ΄ | 2015-01-26 | 2015-01-28 |
| cnvd-2015-00710 | Google Chrome PDFiumθΆηθ―»ζΌζ΄οΌCNVD-2015-00710οΌ | 2015-01-26 | 2015-01-28 |
| cnvd-2015-00711 | Google Chrome PDFiumθΆηθ―»ζΌζ΄οΌCNVD-2015-00711οΌ | 2015-01-26 | 2015-01-28 |
| cnvd-2015-00712 | Google Chrome UIθΆηθ―»εζΌζ΄ | 2015-01-26 | 2015-01-28 |
| cnvd-2015-00713 | Google Chromeεδ½ζͺεε§εζΌζ΄ | 2015-01-26 | 2015-01-28 |
| cnvd-2015-00714 | FerretCMSεε¨ε€δΈͺSQL注ε ₯ζΌζ΄ | 2015-01-26 | 2015-01-28 |
| cnvd-2015-00715 | Google Chrome ICUζͺεε§εζΌζ΄ | 2015-01-26 | 2015-01-28 |
| cnvd-2015-00716 | Google Chrome V8εζΊη»θΏζΌζ΄ | 2015-01-26 | 2015-01-28 |
| cnvd-2015-00717 | Google Chromeεδ½ε εη ΄εζΌζ΄ | 2015-01-26 | 2015-01-28 |
| cnvd-2015-00691 | QPR Portal HTML注ε ₯ζΌζ΄ | 2015-01-27 | 2015-01-28 |
| cnvd-2015-00692 | QPR Portal 'RID'εζ°θ·¨η«θζ¬ζΌζ΄ | 2015-01-27 | 2015-01-28 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2015-03111 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ ΡΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 05.07.2024 |
| bdu:2015-03112 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ ΡΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-03113 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ ΡΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 05.07.2024 |
| bdu:2015-03114 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ Π»ΠΎΠΊΠ°Π»ΡΠ½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 05.07.2024 |
| bdu:2015-03115 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ ΡΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 05.07.2024 |
| bdu:2015-03116 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ ΡΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 05.07.2024 |
| bdu:2015-03117 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ Π»ΠΎΠΊΠ°Π»ΡΠ½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 05.07.2024 |
| bdu:2015-03118 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ Π»ΠΎΠΊΠ°Π»ΡΠ½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 05.07.2024 |
| bdu:2015-03119 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ Π»ΠΎΠΊΠ°Π»ΡΠ½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 05.07.2024 |
| bdu:2015-03120 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ Π»ΠΎΠΊΠ°Π»ΡΠ½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-03121 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ Π»ΠΎΠΊΠ°Π»ΡΠ½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-03122 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ Debian GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ ΡΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 05.07.2024 |
| bdu:2015-03123 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ ΡΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 05.07.2024 |
| bdu:2015-03124 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ ΡΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-03125 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ ΡΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-03126 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ ΡΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-03127 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ ΡΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-03128 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ Π»ΠΎΠΊΠ°Π»ΡΠ½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 05.07.2024 |
| bdu:2015-03129 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ Π»ΠΎΠΊΠ°Π»ΡΠ½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-03130 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ Π»ΠΎΠΊΠ°Π»ΡΠ½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-03131 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ ΡΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 05.07.2024 |
| bdu:2015-03132 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ ΡΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 05.07.2024 |
| bdu:2015-03133 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ ΡΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-03134 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ ΡΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 05.07.2024 |
| bdu:2015-03135 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ ΡΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 05.07.2024 |
| bdu:2015-03136 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ ΡΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 05.07.2024 |
| bdu:2015-03137 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ ΡΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 05.07.2024 |
| bdu:2015-03138 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ ΡΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-03139 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ ΡΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-03140 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ ΡΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 28.11.2016 |
| ID | Description | Updated |
|---|---|---|
| var-202107-1849 | Axis is an IT company that specializes in providing network video solutions. Axis 205β¦ | 2022-05-04T09:15:23.302000Z |
| var-202107-1870 | Axis is an IT company that specializes in providing network video solutions. Axis 212β¦ | 2022-05-04T09:15:23.287000Z |
| var-202107-1891 | Axis is an IT company that specializes in providing network video solutions. AXIS M10β¦ | 2022-05-04T09:15:23.275000Z |
| var-202107-1912 | Omron Automation (China) Co., Ltd. is a multinational company that leads industrial autom⦠| 2022-05-04T09:15:23.264000Z |
| var-202106-1132 | SAP NetWeaver ABAP Server and ABAP Platform, versions - 700, 701, 702, 731, 740, 750, 751β¦ | 2022-05-04T09:15:24.803000Z |
| var-202106-1805 | SAP NetWeaver ABAP Server and ABAP Platform (Enqueue Server), versions - KRNL32NUC - 7.22β¦ | 2022-05-04T09:15:24.597000Z |
| var-202106-1806 | SAP NetWeaver ABAP Server and ABAP Platform (Enqueue Server), versions - KRNL32NUC - 7.22β¦ | 2022-05-04T09:15:24.719000Z |
| var-202106-1807 | SAP NetWeaver ABAP Server and ABAP Platform (Enqueue Server), versions - KRNL32NUC - 7.22β¦ | 2022-05-04T09:15:24.660000Z |
| var-202106-1820 | SAP NetWeaver ABAP Server and ABAP Platform (Enqueue Server), versions - KRNL32NUC - 7.22β¦ | 2022-05-04T09:15:24.690000Z |
| var-202106-2008 | Committed to the development and application of network communication products and IoT se⦠| 2022-05-04T09:15:24.331000Z |
| var-202106-2029 | D-Link DIR-809 is a wireless router using RTOS. D-Link DIR-809 has a binary vulnerabi⦠| 2022-05-04T09:15:24.320000Z |
| var-202106-2050 | Tenda AC11 is a wireless router that uses RTOS operating system. Shenzhen Jixiang Ten⦠| 2022-05-04T09:15:24.308000Z |
| var-202106-2071 | Henan Pangu Technology Development Co., Ltd. is a professional enterprise organization th⦠| 2022-05-04T09:15:24.299000Z |
| var-202106-2092 | ENS202EXT is an outdoor wireless bridge made by EnGenius. EnGenius ENS202EXT has a we⦠| 2022-05-04T09:15:24.287000Z |
| var-202106-2113 | Ruckus 7781CM is a wireless access point product of Ruckus Wireless. Ruckus Wireless β¦ | 2022-05-04T09:15:24.276000Z |
| var-202106-2134 | Established in 2005, UTEPO is an industrial communication and intelligent Internet of Thi⦠| 2022-05-04T09:15:24.265000Z |
| var-202106-2155 | NETGEAR WNR2000v4 router is a wireless router device. The NETGEAR WNR2000v4 router ha⦠| 2022-05-04T09:15:24.249000Z |
| var-202106-2176 | EA6300 is a router product of Belkin Company. Belkin's EA6300 has a weak password vul⦠| 2022-05-04T09:15:24.238000Z |
| var-202106-2197 | H3C SecPath U200-M is a new generation of UTM (United Threat Management) equipment design⦠| 2022-05-04T09:15:24.228000Z |
| var-202106-2218 | Prolink Technology Co., Ltd. is the world's leading supplier of network communication equ⦠| 2022-05-04T09:15:24.216000Z |
| var-202106-2239 | TP-LINK Technology Co., Ltd. (hereinafter referred to as "TP-LINK") is the world's leadin⦠| 2022-05-04T09:15:24.205000Z |
| var-202106-2260 | Shanghai Aitai Technology Co., Ltd. is a small and medium-sized network solution provider⦠| 2022-05-04T09:15:24.189000Z |
| var-202106-2281 | MOBOTIX is a world-renowned network camera technology leader. It has been producing pure β¦ | 2022-05-04T09:15:24.177000Z |
| var-202106-2302 | TL-IPC223, etc. are all network camera products of Prolink Technology Co., Ltd. Many β¦ | 2022-05-04T09:15:24.166000Z |
| var-202106-2323 | Yongbo (Xiamen) Electrical Technology Co., Ltd. was founded in 2010, focusing on overall β¦ | 2022-05-04T09:15:24.156000Z |
| var-202104-1976 | Quick control configuration software is a monitoring software used in industrial power an⦠| 2022-05-04T09:15:25.817000Z |
| var-202104-1997 | Ruijie Networks Co., Ltd. is a company mainly engaged in information system integration s⦠| 2022-05-04T09:15:25.806000Z |
| var-202104-2018 | TOTOLINK is a high-end wireless router brand in the Asia-Pacific region, with a market sh⦠| 2022-05-04T09:15:25.793000Z |
| var-202104-2039 | Shenzhen Jixiang Tengda Technology Co., Ltd. is a high-tech enterprise integrating indepe⦠| 2022-05-04T09:15:25.777000Z |
| var-202104-2060 | Tangshan Liulin Automation Equipment Co., Ltd. is a high-tech enterprise specializing in β¦ | 2022-05-04T09:15:25.766000Z |