Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-1999-0643 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The IMAP service is running. | N/A | N/A | 2000-02-04T05:00:00 | 2003-03-21T10:00:00 |
| CVE-1999-0644 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The NNTP news service is running. | N/A | N/A | 2000-02-04T05:00:00 | 2003-03-21T10:00:00 |
| CVE-1999-0645 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The IRC service is running. | N/A | N/A | 2000-02-04T05:00:00 | 2003-03-21T10:00:00 |
| CVE-1999-0646 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The LDAP service is running. | N/A | N/A | 2000-02-04T05:00:00 | 2003-03-21T10:00:00 |
| CVE-1999-0647 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The bootparam (bootparamd) service is running. | N/A | N/A | 2000-02-04T05:00:00 | 2003-05-08T09:00:00 |
| CVE-1999-0648 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The X25 service is running. | N/A | N/A | 2000-02-04T05:00:00 | 2003-03-21T10:00:00 |
| CVE-1999-0649 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The FSP service is running. | N/A | N/A | 2000-02-04T05:00:00 | 2005-11-02T10:00:00 |
| CVE-1999-0650 |
N/A
|
The netstat service is running, which provides se… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.577Z |
| CVE-1999-0651 |
N/A
|
The rsh/rlogin service is running. |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.528Z |
| CVE-1999-0652 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A database service is running, e.g. a SQL server, Oracle, or mySQL. | N/A | N/A | 2000-02-04T05:00:00 | 2005-11-02T10:00:00 |
| CVE-1999-0653 |
N/A
|
A component service related to NIS+ is running. |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.499Z |
| CVE-1999-0654 |
N/A
|
The OS/2 or POSIX subsystem in NT is enabled. |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.952Z |
| CVE-1999-0655 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is not about any specific product, protocol, or design, so it is out of scope of CVE. Notes: the former description is: "A service may include useful information in its banner or help function (such as the name and version), making it useful for information gathering activities. | N/A | N/A | 2000-02-04T05:00:00 | 2001-12-09T10:00:00 |
| CVE-1999-0656 |
N/A
|
The ugidd RPC interface, by design, allows remote… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.159Z |
| CVE-1999-0657 |
N/A
|
WinGate is being used. |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:36.982Z |
| CVE-1999-0658 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "DCOM is running. | N/A | N/A | 2000-02-04T05:00:00 | 2003-03-21T10:00:00 |
| CVE-1999-0659 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A Windows NT Primary Domain Controller (PDC) or Backup Domain Controller (BDC) is present. | N/A | N/A | 2000-02-04T05:00:00 | 2003-03-21T10:00:00 |
| CVE-1999-0660 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is not about any specific product, protocol, or design, so it is out of scope of CVE. It might be more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A hacker utility, back door, or Trojan Horse is installed on a system, e.g. NetBus, Back Orifice, Rootkit, etc. | N/A | N/A | 2000-02-04T05:00:00 | 2003-03-21T10:00:00 |
| CVE-1999-0661 |
N/A
|
A system is running a version of software that wa… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.297Z |
| CVE-1999-0662 |
N/A
|
A system-critical program or library does not hav… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.804Z |
| CVE-1999-0663 |
N/A
|
A system-critical program, library, or file has a… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.505Z |
| CVE-1999-0664 |
N/A
|
An application-critical Windows NT registry key h… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.583Z |
| CVE-1999-0665 |
N/A
|
An application-critical Windows NT registry key h… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.576Z |
| CVE-1999-0667 |
N/A
|
The ARP protocol allows any host to spoof ARP rep… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.039Z |
| CVE-1999-0669 |
N/A
|
The Eyedog ActiveX control is marked as "safe for… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.535Z |
| CVE-1999-0670 |
N/A
|
Buffer overflow in the Eyedog ActiveX control all… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.621Z |
| CVE-1999-0673 |
N/A
|
Buffer overflow in ALMail32 POP3 client via From:… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.651Z |
| CVE-1999-0677 |
N/A
|
The WebRamp web administration utility has a defa… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.038Z |
| CVE-1999-0684 |
N/A
|
Denial of service in Sendmail 8.8.6 in HPUX. |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.040Z |
| CVE-1999-0698 |
N/A
|
Denial of service in IP protocol logger (ippl) on… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.337Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-1999-0643 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The IMAP service is running. | N/A | N/A | 2000-02-04T05:00:00 | 2003-03-21T10:00:00 |
| CVE-1999-0644 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The NNTP news service is running. | N/A | N/A | 2000-02-04T05:00:00 | 2003-03-21T10:00:00 |
| CVE-1999-0645 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The IRC service is running. | N/A | N/A | 2000-02-04T05:00:00 | 2003-03-21T10:00:00 |
| CVE-1999-0646 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The LDAP service is running. | N/A | N/A | 2000-02-04T05:00:00 | 2003-03-21T10:00:00 |
| CVE-1999-0647 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The bootparam (bootparamd) service is running. | N/A | N/A | 2000-02-04T05:00:00 | 2003-05-08T09:00:00 |
| CVE-1999-0648 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The X25 service is running. | N/A | N/A | 2000-02-04T05:00:00 | 2003-03-21T10:00:00 |
| CVE-1999-0649 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The FSP service is running. | N/A | N/A | 2000-02-04T05:00:00 | 2005-11-02T10:00:00 |
| CVE-1999-0650 |
N/A
|
The netstat service is running, which provides se… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.577Z |
| CVE-1999-0651 |
N/A
|
The rsh/rlogin service is running. |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.528Z |
| CVE-1999-0652 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A database service is running, e.g. a SQL server, Oracle, or mySQL. | N/A | N/A | 2000-02-04T05:00:00 | 2005-11-02T10:00:00 |
| CVE-1999-0653 |
N/A
|
A component service related to NIS+ is running. |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.499Z |
| CVE-1999-0654 |
N/A
|
The OS/2 or POSIX subsystem in NT is enabled. |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.952Z |
| CVE-1999-0655 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is not about any specific product, protocol, or design, so it is out of scope of CVE. Notes: the former description is: "A service may include useful information in its banner or help function (such as the name and version), making it useful for information gathering activities. | N/A | N/A | 2000-02-04T05:00:00 | 2001-12-09T10:00:00 |
| CVE-1999-0656 |
N/A
|
The ugidd RPC interface, by design, allows remote… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.159Z |
| CVE-1999-0657 |
N/A
|
WinGate is being used. |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:36.982Z |
| CVE-1999-0658 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "DCOM is running. | N/A | N/A | 2000-02-04T05:00:00 | 2003-03-21T10:00:00 |
| CVE-1999-0659 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A Windows NT Primary Domain Controller (PDC) or Backup Domain Controller (BDC) is present. | N/A | N/A | 2000-02-04T05:00:00 | 2003-03-21T10:00:00 |
| CVE-1999-0660 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is not about any specific product, protocol, or design, so it is out of scope of CVE. It might be more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A hacker utility, back door, or Trojan Horse is installed on a system, e.g. NetBus, Back Orifice, Rootkit, etc. | N/A | N/A | 2000-02-04T05:00:00 | 2003-03-21T10:00:00 |
| CVE-1999-0661 |
N/A
|
A system is running a version of software that wa… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.297Z |
| CVE-1999-0662 |
N/A
|
A system-critical program or library does not hav… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.804Z |
| CVE-1999-0663 |
N/A
|
A system-critical program, library, or file has a… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.505Z |
| CVE-1999-0664 |
N/A
|
An application-critical Windows NT registry key h… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.583Z |
| CVE-1999-0665 |
N/A
|
An application-critical Windows NT registry key h… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.576Z |
| CVE-1999-0667 |
N/A
|
The ARP protocol allows any host to spoof ARP rep… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.039Z |
| CVE-1999-0669 |
N/A
|
The Eyedog ActiveX control is marked as "safe for… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.535Z |
| CVE-1999-0670 |
N/A
|
Buffer overflow in the Eyedog ActiveX control all… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.621Z |
| CVE-1999-0673 |
N/A
|
Buffer overflow in ALMail32 POP3 client via From:… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.651Z |
| CVE-1999-0677 |
N/A
|
The WebRamp web administration utility has a defa… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.038Z |
| CVE-1999-0684 |
N/A
|
Denial of service in Sendmail 8.8.6 in HPUX. |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.040Z |
| CVE-1999-0698 |
N/A
|
Denial of service in IP protocol logger (ippl) on… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.337Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-1999-0580 | The HKEY_LOCAL_MACHINE key in a Windows NT system has inappropriate, system-critical permissions. | 1999-01-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0581 | The HKEY_CLASSES_ROOT key in a Windows NT system has inappropriate, system-critical permissions. | 1999-01-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0583 | There is a one-way or two-way trust relationship between Windows NT domains. | 1999-01-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0584 | A Windows NT file system is not NTFS. | 1999-01-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0586 | A network service is running on a nonstandard port. | 1999-01-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0587 | A WWW server is not running in a restricted file system, e.g. through a chroot, thus allowing acces… | 1999-01-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0588 | A filter in a router or firewall allows unusual fragmented packets. | 1999-01-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0589 | A system-critical Windows NT registry key has inappropriate permissions. | 1999-01-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0591 | An event log in Windows NT has inappropriate access permissions. | 1999-01-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0592 | The Logon box of a Windows NT system displays the name of the last user who logged in. | 1999-01-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0593 | The default setting for the Winlogon key entry ShutdownWithoutLogon in Windows NT allows users with… | 1999-01-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0594 | A Windows NT system does not restrict access to removable media drives such as a floppy disk drive … | 1999-01-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0596 | A Windows NT log file has an inappropriate maximum size or retention period. | 1999-01-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0597 | A Windows NT account policy does not forcibly disconnect remote users from the server when their lo… | 1999-01-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0598 | A network intrusion detection system (IDS) does not properly handle packets that are sent out of or… | 1999-01-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0599 | A network intrusion detection system (IDS) does not properly handle packets with improper sequence … | 1999-01-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0600 | A network intrusion detection system (IDS) does not verify the checksum on a packet. | 1999-01-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0601 | A network intrusion detection system (IDS) does not properly handle data within TCP handshake packets. | 1999-01-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0602 | A network intrusion detection system (IDS) does not properly reassemble fragmented packets. | 1999-01-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0603 | In Windows NT, an inappropriate user is a member of a group, e.g. Administrator, Backup Operators, … | 1999-01-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0611 | A system-critical Windows NT registry key has an inappropriate value. | 1999-01-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0613 | The rpc.sprayd service is running. | 1999-01-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0614 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is so… | 1999-01-01T05:00:00.000 | 2023-11-07T01:54:59.310 |
| fkie_cve-1999-0615 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is so… | 1999-01-01T05:00:00.000 | 2023-11-07T01:54:59.343 |
| fkie_cve-1999-0616 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is so… | 1999-01-01T05:00:00.000 | 2023-11-07T01:54:59.373 |
| fkie_cve-1999-0617 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is so… | 1999-01-01T05:00:00.000 | 2023-11-07T01:54:59.410 |
| fkie_cve-1999-0618 | The rexec service is running. | 1999-01-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0619 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is so… | 1999-01-01T05:00:00.000 | 2023-11-07T01:54:59.450 |
| fkie_cve-1999-0620 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is so… | 1999-01-01T05:00:00.000 | 2023-11-07T01:54:59.480 |
| fkie_cve-1999-0621 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is so… | 1999-01-01T05:00:00.000 | 2023-11-07T01:54:59.540 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-qcj7-g2j5-g7r3 |
7.5 (3.1)
|
In Bouncy Castle JCE Provider ECDSA does not fully validate ASN.1 encoding of signature on verification | 2018-10-17T16:24:12Z | 2025-09-02T20:27:34Z |
| ghsa-rrvx-pwf8-p59p |
7.5 (3.1)
|
In Bouncy Castle JCE Provider the DSA key pair generator generates a weak private key if used with … | 2018-10-17T16:24:22Z | 2025-09-12T19:14:22Z |
| ghsa-fjqm-246c-mwqg |
3.7 (3.1)
|
In Bouncy Castle JCE Provider the other party DH public key is not fully validated | 2018-10-17T16:27:28Z | 2025-09-12T19:16:49Z |
| ghsa-w285-wf9q-5w69 |
7.4 (3.1)
|
In Bouncy Castle JCE Provider the ECIES implementation allowed the use of ECB mode | 2018-10-17T16:27:38Z | 2025-09-12T19:17:28Z |
| ghsa-4mv7-cq75-3qjm |
|
Moderate severity vulnerability that affects org.bouncycastle:bcprov-jdk14 and org.bouncycastle:bcp… | 2018-10-17T16:27:50Z | 2025-09-12T19:30:13Z |
| ghsa-pjfr-qf3p-3q25 |
8.1 (3.1)
|
When running Apache Tomcat on Windows with HTTP PUTs enabled it was possible to upload a JSP file t… | 2018-10-17T16:30:31Z | 2025-10-22T17:31:15Z |
| ghsa-5q99-f34m-67gc |
4.3 (3.1)
|
Apache Tomcat Open Redirect vulnerability | 2018-10-17T16:31:02Z | 2024-02-22T22:43:50Z |
| ghsa-6rxj-58jh-436r |
5.9 (3.1)
|
Apache Tomcat unauthorized access vulnerability | 2018-10-17T16:31:17Z | 2024-02-23T17:46:56Z |
| ghsa-jx6h-3fjx-cgv5 |
6.5 (3.1)
|
Apache Tomcat information exposure vulnerability | 2018-10-17T16:31:48Z | 2024-02-23T17:54:01Z |
| ghsa-m59c-jpc8-m2x4 |
7.5 (3.1)
|
In Apache Tomcat there is an improper handing of overflow in the UTF-8 decoder | 2018-10-17T16:32:18Z | 2024-02-23T17:57:09Z |
| ghsa-r4x2-3cq5-hqvp |
9.8 (3.1)
|
The defaults settings for the CORS filter provided in Apache Tomcat are insecure and enable 'suppor… | 2018-10-17T16:32:32Z | 2024-02-23T18:01:23Z |
| ghsa-46j3-r4pj-4835 |
7.5 (3.1)
|
The host name verification missing in Apache Tomcat | 2018-10-17T16:32:43Z | 2024-10-21T19:06:46Z |
| ghsa-6v52-mj5r-7j2m |
5.9 (3.1)
|
Apache Tomcat Race Condition vulnerability | 2018-10-17T16:33:02Z | 2024-02-22T21:06:50Z |
| ghsa-j84c-j8qm-g47r |
9.8 (3.1)
|
The Admin UI in Apache Ranger before 0.5.1 does not properly handle authentication requests that la… | 2018-10-17T17:21:11Z | 2022-04-27T13:41:39Z |
| ghsa-4rjf-mxfm-98h5 |
7.2 (3.1)
|
SQL injection vulnerability in the policy admin tool in Apache Ranger | 2018-10-17T17:21:29Z | 2022-04-27T13:48:01Z |
| ghsa-rf7q-xqm3-6923 |
4.8 (3.1)
|
Apache Ranger allows remote authenticated administrators to inject arbitrary web script or HTML | 2018-10-17T17:21:37Z | 2022-04-27T13:48:55Z |
| ghsa-vhxc-8jjq-859j |
6.5 (3.1)
|
Moderate severity vulnerability that affects org.apache.ranger:ranger | 2018-10-17T17:21:44Z | 2021-09-20T22:05:45Z |
| ghsa-v7mf-qgxf-qmvf |
4.8 (3.1)
|
Apache Ranger admin users can store some arbitrary javascript code to be executed when normal users… | 2018-10-17T17:21:54Z | 2022-04-27T13:49:46Z |
| ghsa-xv7x-x6wr-xx7g |
5.9 (3.1)
|
Apache Ranger policy engine incorrectly matches paths in certain conditions | 2018-10-17T17:22:05Z | 2023-11-21T11:56:13Z |
| ghsa-c99h-fgqm-6679 |
8.8 (3.1)
|
UnixAuthenticationService in Apache Ranger was updated to correctly handle user input to avoid Stac… | 2018-10-17T17:22:23Z | 2022-04-27T13:52:10Z |
| ghsa-758m-6g3q-g3hh |
9.8 (3.1)
|
Policy resource matcher in Apache Ranger before 0.7.1 ignores characters after '' wildcard character | 2018-10-17T17:22:38Z | 2022-04-27T13:54:27Z |
| ghsa-ffjh-fjgg-mfpq |
5.9 (3.1)
|
Moderate severity vulnerability that affects org.apache.ranger:ranger | 2018-10-17T17:22:49Z | 2021-09-10T18:07:43Z |
| ghsa-4fq3-mr56-cg6r |
9.8 (3.1)
|
Spring Data Commons remote code injection vulnerability | 2018-10-17T17:23:24Z | 2024-03-20T14:20:41Z |
| ghsa-m929-7fr6-cvjg |
7.5 (3.1)
|
Spring Data Commons, used in combination with XMLBeam, contains a property binder vulnerability cau… | 2018-10-17T17:23:36Z | 2022-04-27T13:58:00Z |
| ghsa-5q8m-mqmx-pxp9 |
7.5 (3.1)
|
Spring Data Commons contain a property path parser vulnerability caused by unlimited resource allocation | 2018-10-17T17:23:44Z | 2024-03-04T20:01:15Z |
| ghsa-h5f5-rj4r-42f6 |
9.8 (3.1)
|
Incorrect access control in Neo4j Enterprise Database Server via LDAP authentication | 2018-10-17T17:31:26Z | 2022-04-27T14:23:03Z |
| ghsa-4c32-xmgj-2g98 |
7.8 (3.1)
|
High severity vulnerability that affects org.apache.pdfbox:pdfbox | 2018-10-17T18:22:15Z | 2021-09-01T14:11:59Z |
| ghsa-gx96-vgf7-hwfg |
5.5 (3.1)
|
In Apache PDFBox a carefully crafted PDF file can trigger an extremely long running computation | 2018-10-17T18:22:29Z | 2022-04-27T14:23:39Z |
| ghsa-6fvx-r7hx-3vh6 |
9.8 (3.1)
|
JavaMelody has XXE via parseSoapMethodName in bull/javamelody/PayloadNameRequestWrapper.java. | 2018-10-17T18:28:00Z | 2022-04-27T14:25:05Z |
| ghsa-x825-rjww-2245 |
8.8 (3.1)
|
Apache Storm it is possible for the owner of a topology to trick the supervisor to launch a worker … | 2018-10-17T18:30:01Z | 2022-04-27T14:25:41Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2019-232 |
|
Memcpy parameter overlap in Google Snappy library 1.1.4, as used in Google TensorFlow bef… | tensorflow-gpu | 2019-04-24T17:29:00Z | 2021-12-09T06:35:11.800944Z |
| pysec-2019-235 |
|
NULL pointer dereference in Google TensorFlow before 1.12.2 could cause a denial of servi… | tensorflow-gpu | 2019-04-24T17:29:00Z | 2021-12-09T06:35:11.945126Z |
| pysec-2019-205 |
|
Google TensorFlow 1.7.x and earlier is affected by a Buffer Overflow vulnerability. The t… | tensorflow | 2019-04-24T21:29:00Z | 2021-08-27T03:22:22.242054Z |
| pysec-2019-223 |
|
Google TensorFlow 1.7.x and earlier is affected by a Buffer Overflow vulnerability. The t… | tensorflow-cpu | 2019-04-24T21:29:00Z | 2021-08-27T03:22:22.242054Z |
| pysec-2019-230 |
|
Google TensorFlow 1.7.x and earlier is affected by a Buffer Overflow vulnerability. The t… | tensorflow-gpu | 2019-04-24T21:29:00Z | 2021-12-09T06:35:11.711453Z |
| pysec-2019-185 |
|
An issue was discovered in Matrix Sydent before 1.0.3 and Synapse before 0.99.3.1. Random… | matrix-synapse | 2019-05-09T18:29:00Z | 2021-08-27T03:22:06.320363Z |
| pysec-2019-242 |
5.5 (3.1)
|
Capstone 3.0.4 has an out-of-bounds vulnerability (SEGV caused by a read memory access) i… | capstone | 2019-05-15T14:29:00Z | 2025-01-28T17:34:08.578134Z |
| pysec-2019-6 |
|
Buildbot before 1.8.2 and 2.x before 2.3.1 accepts a user-submitted authorization token f… | buildbot | 2019-05-23T15:30:00Z | 2019-06-07T18:29:00Z |
| pysec-2019-256 |
7.5 (3.1)
|
In libwebp 0.5.1, there is a double free bug in libwebpmux. | webp | 2019-05-23T18:29:00Z | 2024-11-21T14:23:03.194401Z |
| pysec-2019-79 |
|
An issue was discovered in Django 1.11 before 1.11.21, 2.1 before 2.1.9, and 2.2 before 2… | django | 2019-06-03T17:29:00Z | 2019-06-12T17:29:00Z |
| pysec-2019-194 |
|
An access-control flaw was found in the Octavia service when the cloud platform was deplo… | octavia | 2019-06-03T19:29:00Z | 2021-08-27T03:22:09.805726Z |
| pysec-2019-109 |
|
** DISPUTED ** A deserialization vulnerability exists in the way parso through 0.4.0 hand… | parso | 2019-06-06T19:29:00Z | 2019-07-05T11:15:00Z |
| pysec-2019-199 |
|
A code injection issue was discovered in PyXDG before 0.26 via crafted Python code in a C… | pyxdg | 2019-06-06T19:29:00Z | 2021-08-27T03:22:18.878765Z |
| pysec-2019-162 |
|
aubio v0.4.0 to v0.4.8 has a Buffer Overflow in new_aubio_tempo. | aubio | 2019-06-07T17:29:00Z | 2021-08-25T04:29:55.885441Z |
| pysec-2019-163 |
|
aubio v0.4.0 to v0.4.8 has a NULL pointer dereference in new_aubio_filterbank via invalid… | aubio | 2019-06-07T17:29:00Z | 2021-08-25T04:29:55.933107Z |
| pysec-2019-164 |
|
aubio v0.4.0 to v0.4.8 has a new_aubio_onset NULL pointer dereference. | aubio | 2019-06-07T17:29:00Z | 2021-08-25T04:29:55.989477Z |
| pysec-2019-128 |
|
In Twisted before 19.2.1, twisted.web did not validate or sanitize URIs or HTTP methods, … | twisted | 2019-06-10T12:29:00Z | 2020-08-24T17:37:00Z |
| pysec-2019-129 |
|
In words.protocols.jabber.xmlstream in Twisted through 19.2.1, XMPP support did not verif… | twisted | 2019-06-16T12:29:00Z | 2019-08-14T03:15:00Z |
| pysec-2019-103 |
|
KeyIdentity LinOTP before 2.10.5.3 has Incorrect Access Control (issue 1 of 2). | linotp | 2019-06-27T14:15:00Z | 2020-08-24T17:37:00Z |
| pysec-2019-10 |
|
An issue was discovered in Django 1.11 before 1.11.22, 2.1 before 2.1.10, and 2.2 before … | django | 2019-07-01T14:15:00Z | 2020-08-24T17:37:00Z |
| pysec-2019-20 |
|
verification.py in django-rest-registration (aka Django REST Registration library) before… | django-rest-registration | 2019-07-02T22:15:00Z | 2019-07-12T13:52:00Z |
| pysec-2019-218 |
|
libnmap < v0.6.3 is affected by: XML Injection. The impact is: Denial of service (DoS) by… | python-libnmap | 2019-07-15T03:15:00Z | 2021-11-16T03:58:45.118185Z |
| pysec-2019-170 |
|
An issue was discovered in python-engineio through 3.8.2. There is a Cross-Site WebSocket… | python-engineio | 2019-07-16T00:15:00Z | 2021-08-25T04:30:27.861588Z |
| pysec-2019-179 |
|
The Pallets Project Flask before 1.0 is affected by: unexpected memory usage. The impact … | flask | 2019-07-17T14:15:00Z | 2021-08-27T03:22:03.986184Z |
| pysec-2019-119 |
|
SaltStack Salt 2018.3, 2019.2 is affected by: SQL Injection. The impact is: An attacker c… | salt | 2019-07-18T17:15:00Z | 2019-08-13T18:15:00Z |
| pysec-2019-184 |
|
Ladon since 0.6.1 (since ebef0aae48af78c159b6fce81bc6f5e7e0ddb059) is affected by: XML Ex… | ladon | 2019-07-18T17:15:00Z | 2021-08-27T03:22:05.932908Z |
| pysec-2019-120 |
|
scapy 2.4.0 is affected by: Denial of Service. The impact is: infinite loop, resource con… | scapy | 2019-07-19T16:15:00Z | 2020-08-24T17:37:00Z |
| pysec-2019-244 |
7.8 (3.1)
|
Exiv2 0.27.99.0 has a heap-based buffer over-read in Exiv2::RafImage::readMetadata() in r… | exiv2 | 2019-07-28T19:15:00Z | 2024-11-21T14:22:49.479201Z |
| pysec-2019-245 |
6.5 (3.1)
|
Exiv2::PngImage::readMetadata() in pngimage.cpp in Exiv2 0.27.99.0 allows attackers to ca… | exiv2 | 2019-07-28T19:15:00Z | 2024-11-21T14:22:49.538663Z |
| pysec-2019-246 |
6.5 (3.1)
|
In Exiv2 0.27.99.0, there is an out-of-bounds read in Exiv2::MrwImage::readMetadata() in … | exiv2 | 2019-07-28T19:15:00Z | 2024-11-21T14:22:49.597801Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| MAL-2022-6933 | Malicious code in vimeo-threejs-player (npm) | 2022-06-13T06:00:39Z | 2022-06-13T06:00:39Z |
| MAL-2022-6934 | Malicious code in vimeo_depth_player (npm) | 2022-06-13T06:00:39Z | 2022-06-13T06:00:40Z |
| MAL-2022-888 | Malicious code in aframe-vimeo-component (npm) | 2022-06-13T06:00:39Z | 2022-06-13T06:00:40Z |
| mal-2022-6933 | Malicious code in vimeo-threejs-player (npm) | 2022-06-13T06:00:39Z | 2022-06-13T06:00:39Z |
| mal-2022-6934 | Malicious code in vimeo_depth_player (npm) | 2022-06-13T06:00:39Z | 2022-06-13T06:00:40Z |
| mal-2022-888 | Malicious code in aframe-vimeo-component (npm) | 2022-06-13T06:00:39Z | 2022-06-13T06:00:40Z |
| MAL-2022-2577 | Malicious code in downloadkubernetes (npm) | 2022-06-13T06:00:40Z | 2022-06-13T06:00:40Z |
| MAL-2022-4236 | Malicious code in kubernetes-dashboard (npm) | 2022-06-13T06:00:40Z | 2022-06-13T06:00:40Z |
| MAL-2022-4238 | Malicious code in kubernetes-ui (npm) | 2022-06-13T06:00:40Z | 2022-06-13T06:00:40Z |
| mal-2022-2577 | Malicious code in downloadkubernetes (npm) | 2022-06-13T06:00:40Z | 2022-06-13T06:00:40Z |
| mal-2022-4236 | Malicious code in kubernetes-dashboard (npm) | 2022-06-13T06:00:40Z | 2022-06-13T06:00:40Z |
| mal-2022-4238 | Malicious code in kubernetes-ui (npm) | 2022-06-13T06:00:40Z | 2022-06-13T06:00:40Z |
| MAL-2022-1667 | Malicious code in brave-bitgo-client (npm) | 2022-06-13T06:01:29Z | 2022-06-13T06:01:30Z |
| MAL-2022-1668 | Malicious code in brave-chromium-themes (npm) | 2022-06-13T06:01:29Z | 2022-06-13T06:01:30Z |
| MAL-2022-1669 | Malicious code in brave-core (npm) | 2022-06-13T06:01:29Z | 2022-06-13T06:01:30Z |
| MAL-2022-7067 | Malicious code in web-discovery-project (npm) | 2022-06-13T06:01:29Z | 2022-06-13T06:01:29Z |
| mal-2022-1667 | Malicious code in brave-bitgo-client (npm) | 2022-06-13T06:01:29Z | 2022-06-13T06:01:30Z |
| mal-2022-1668 | Malicious code in brave-chromium-themes (npm) | 2022-06-13T06:01:29Z | 2022-06-13T06:01:30Z |
| mal-2022-1669 | Malicious code in brave-core (npm) | 2022-06-13T06:01:29Z | 2022-06-13T06:01:30Z |
| mal-2022-7067 | Malicious code in web-discovery-project (npm) | 2022-06-13T06:01:29Z | 2022-06-13T06:01:29Z |
| MAL-2022-1670 | Malicious code in brave-core-crx-packager (npm) | 2022-06-13T06:01:30Z | 2022-06-13T06:01:36Z |
| MAL-2022-1671 | Malicious code in brave-extension (npm) | 2022-06-13T06:01:30Z | 2022-06-13T06:01:31Z |
| MAL-2022-1672 | Malicious code in brave-eyeshade (npm) | 2022-06-13T06:01:30Z | 2022-06-13T06:01:31Z |
| MAL-2022-1673 | Malicious code in brave-ios (npm) | 2022-06-13T06:01:30Z | 2022-06-13T06:01:30Z |
| MAL-2022-1674 | Malicious code in brave-ledger (npm) | 2022-06-13T06:01:30Z | 2022-06-13T06:01:30Z |
| MAL-2022-1675 | Malicious code in brave-research-participation-tool (npm) | 2022-06-13T06:01:30Z | 2022-06-13T06:01:30Z |
| MAL-2022-4310 | Malicious code in link-bubble (npm) | 2022-06-13T06:01:30Z | 2022-06-13T06:01:30Z |
| MAL-2022-4314 | Malicious code in linkbubble-website (npm) | 2022-06-13T06:01:30Z | 2022-06-13T06:01:30Z |
| MAL-2022-6891 | Malicious code in vault-updater (npm) | 2022-06-13T06:01:30Z | 2022-06-13T06:01:30Z |
| mal-2022-1670 | Malicious code in brave-core-crx-packager (npm) | 2022-06-13T06:01:30Z | 2022-06-13T06:01:36Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2024-2184 | Wireshark: Mehrere Schwachstellen | 2020-12-09T23:00:00.000+00:00 | 2024-09-18T22:00:00.000+00:00 |
| wid-sec-w-2022-1274 | QEMU: Schwachstelle ermöglicht Denial of Service | 2020-12-10T23:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2024-1420 | binutils: Mehrere Schwachstellen ermöglichen Denial of Service | 2020-12-10T23:00:00.000+00:00 | 2024-06-19T22:00:00.000+00:00 |
| wid-sec-w-2022-2387 | Google Android Patchday Dezember 2020 | 2020-12-15T23:00:00.000+00:00 | 2023-05-30T22:00:00.000+00:00 |
| wid-sec-w-2022-1853 | Icinga: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2020-12-17T23:00:00.000+00:00 | 2024-12-08T23:00:00.000+00:00 |
| wid-sec-w-2023-1546 | Roundcube: Schwachstelle ermöglicht Cross-Site Scripting | 2020-12-27T23:00:00.000+00:00 | 2023-06-22T22:00:00.000+00:00 |
| wid-sec-w-2024-1035 | xpdf: Schwachstelle ermöglicht Denial of Service | 2020-12-27T23:00:00.000+00:00 | 2024-05-06T22:00:00.000+00:00 |
| wid-sec-w-2022-1880 | OpenJPEG: Mehrere Schwachstellen ermöglichen Ausführen von beliebigem Programmcode mit Benutzerrechten | 2020-12-29T23:00:00.000+00:00 | 2023-03-15T23:00:00.000+00:00 |
| wid-sec-w-2024-1972 | QEMU: Schwachstelle ermöglicht Denial of Service | 2020-12-30T23:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2022-0206 | ffmpeg: Schwachstellen ermöglichen Codeausführung | 2021-01-03T23:00:00.000+00:00 | 2023-01-02T23:00:00.000+00:00 |
| wid-sec-w-2022-1000 | Node.js: Mehrere Schwachstellen | 2021-01-04T23:00:00.000+00:00 | 2025-06-19T22:00:00.000+00:00 |
| wid-sec-w-2022-1994 | Google Android Patchday Januar | 2021-01-04T23:00:00.000+00:00 | 2024-05-30T22:00:00.000+00:00 |
| wid-sec-w-2025-0234 | Dovecot: Mehrere Schwachstellen | 2021-01-04T23:00:00.000+00:00 | 2025-02-02T23:00:00.000+00:00 |
| wid-sec-w-2022-2114 | PHP: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2021-01-06T23:00:00.000+00:00 | 2024-10-14T22:00:00.000+00:00 |
| wid-sec-w-2023-2534 | Nvidia Treiber: Mehrere Schwachstellen | 2021-01-07T23:00:00.000+00:00 | 2023-10-03T22:00:00.000+00:00 |
| wid-sec-w-2024-1809 | GitLab: Mehrere Schwachstellen | 2021-01-07T23:00:00.000+00:00 | 2024-08-11T22:00:00.000+00:00 |
| wid-sec-w-2022-1349 | Ansible: Schwachstelle ermöglicht Offenlegung von Informationen | 2021-01-11T23:00:00.000+00:00 | 2024-12-03T23:00:00.000+00:00 |
| wid-sec-w-2022-2259 | QEMU: Mehrere Schwachstellen ermöglichen Denial of Service | 2021-01-11T23:00:00.000+00:00 | 2024-08-08T22:00:00.000+00:00 |
| wid-sec-w-2023-2730 | Red Hat Ceph Storage: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2021-01-12T23:00:00.000+00:00 | 2023-10-23T22:00:00.000+00:00 |
| wid-sec-w-2023-0339 | Snort: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2021-01-13T23:00:00.000+00:00 | 2023-02-19T23:00:00.000+00:00 |
| wid-sec-w-2023-1599 | IBM Security Guardium: Mehrere Schwachstellen | 2021-01-13T23:00:00.000+00:00 | 2023-06-29T22:00:00.000+00:00 |
| wid-sec-w-2024-1971 | QEMU: Schwachstelle ermöglicht Offenlegung von Informationen | 2021-01-13T23:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2023-2465 | Apache Tomcat: Schwachstelle ermöglicht Offenlegung von Informationen | 2021-01-14T23:00:00.000+00:00 | 2025-04-01T22:00:00.000+00:00 |
| wid-sec-w-2022-1350 | Ansible: Schwachstelle ermöglicht Offenlegung von Informationen | 2021-01-17T23:00:00.000+00:00 | 2024-12-03T23:00:00.000+00:00 |
| wid-sec-w-2022-0495 | Python: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Benutzerrechten | 2021-01-18T23:00:00.000+00:00 | 2025-06-19T22:00:00.000+00:00 |
| wid-sec-w-2022-1275 | QEMU: Schwachstelle ermöglicht Denial of Service | 2021-01-18T23:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2023-0630 | GNU tar: Schwachstelle ermöglicht Offenlegung von Informationen | 2021-01-18T23:00:00.000+00:00 | 2023-08-13T22:00:00.000+00:00 |
| wid-sec-w-2023-2836 | dnsmasq: Mehrere Schwachstellen | 2021-01-18T23:00:00.000+00:00 | 2023-11-06T23:00:00.000+00:00 |
| wid-sec-w-2022-2240 | mutt: Schwachstelle ermöglicht Denial of Service | 2021-01-19T23:00:00.000+00:00 | 2022-12-06T23:00:00.000+00:00 |
| wid-sec-w-2023-0067 | Oracle MySQL: Mehrere Schwachstellen | 2021-01-19T23:00:00.000+00:00 | 2023-01-11T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2004:047 | Red Hat Security Advisory: pwlib security update | 2004-02-18T10:31:00+00:00 | 2025-11-21T17:26:58+00:00 |
| rhsa-2004_047 | Red Hat Security Advisory: pwlib security update | 2004-02-18T10:31:00+00:00 | 2024-11-21T22:56:59+00:00 |
| rhsa-2004:064 | Red Hat Security Advisory: samba security update | 2004-02-18T10:36:00+00:00 | 2025-11-21T17:27:03+00:00 |
| rhsa-2004_064 | Red Hat Security Advisory: samba security update | 2004-02-18T10:36:00+00:00 | 2024-11-21T22:58:20+00:00 |
| rhsa-2004:065 | Red Hat Security Advisory: : : : Updated kernel packages resolve security vulnerabilities | 2004-02-18T12:03:00+00:00 | 2025-11-21T17:27:03+00:00 |
| rhsa-2004_065 | Red Hat Security Advisory: : : : Updated kernel packages resolve security vulnerabilities | 2004-02-18T12:03:00+00:00 | 2024-11-21T22:58:28+00:00 |
| rhsa-2004:073 | Red Hat Security Advisory: metamail security update | 2004-02-18T12:04:00+00:00 | 2025-11-21T17:27:04+00:00 |
| rhsa-2004_073 | Red Hat Security Advisory: metamail security update | 2004-02-18T12:04:00+00:00 | 2024-11-21T22:58:53+00:00 |
| rhsa-2004:069 | Red Hat Security Advisory: kernel security update | 2004-02-18T18:14:00+00:00 | 2025-11-21T17:27:03+00:00 |
| rhsa-2004_069 | Red Hat Security Advisory: kernel security update | 2004-02-18T18:14:00+00:00 | 2024-11-21T22:58:36+00:00 |
| rhsa-2004:066 | Red Hat Security Advisory: kernel security update | 2004-02-19T17:12:00+00:00 | 2025-11-21T17:27:03+00:00 |
| rhsa-2004_066 | Red Hat Security Advisory: kernel security update | 2004-02-19T17:12:00+00:00 | 2024-11-21T22:58:31+00:00 |
| rhsa-2004:063 | Red Hat Security Advisory: : Updated mod_python packages fix denial of service vulnerability | 2004-02-26T07:36:00+00:00 | 2025-11-21T17:27:02+00:00 |
| rhsa-2004:091 | Red Hat Security Advisory: : Updated libxml2 packages fix security vulnerability | 2004-02-26T07:36:00+00:00 | 2025-11-21T17:27:07+00:00 |
| rhsa-2004_063 | Red Hat Security Advisory: : Updated mod_python packages fix denial of service vulnerability | 2004-02-26T07:36:00+00:00 | 2024-11-21T22:57:39+00:00 |
| rhsa-2004_091 | Red Hat Security Advisory: : Updated libxml2 packages fix security vulnerability | 2004-02-26T07:36:00+00:00 | 2024-11-21T22:59:19+00:00 |
| rhsa-2004:058 | Red Hat Security Advisory: mod_python security update | 2004-02-26T20:36:00+00:00 | 2025-11-21T17:27:01+00:00 |
| rhsa-2004_058 | Red Hat Security Advisory: mod_python security update | 2004-02-26T20:36:00+00:00 | 2024-11-21T22:57:34+00:00 |
| rhsa-2004:090 | Red Hat Security Advisory: libxml2 security update | 2004-02-26T20:38:00+00:00 | 2025-11-21T17:27:06+00:00 |
| rhsa-2004_090 | Red Hat Security Advisory: libxml2 security update | 2004-02-26T20:38:00+00:00 | 2024-11-21T22:59:15+00:00 |
| rhsa-2004:096 | Red Hat Security Advisory: wu-ftpd security update | 2004-03-08T16:55:00+00:00 | 2025-11-21T17:27:09+00:00 |
| rhsa-2004_096 | Red Hat Security Advisory: wu-ftpd security update | 2004-03-08T16:55:00+00:00 | 2024-11-21T22:59:25+00:00 |
| rhsa-2004:093 | Red Hat Security Advisory: : Updated sysstat packages fix security vulnerabilities | 2004-03-10T14:34:00+00:00 | 2025-11-21T17:27:07+00:00 |
| rhsa-2004:102 | Red Hat Security Advisory: : Updated gdk-pixbuf packages fix denial of service vulnerability | 2004-03-10T14:34:00+00:00 | 2025-11-21T17:27:08+00:00 |
| rhsa-2004_093 | Red Hat Security Advisory: : Updated sysstat packages fix security vulnerabilities | 2004-03-10T14:34:00+00:00 | 2024-11-21T22:57:23+00:00 |
| rhsa-2004_102 | Red Hat Security Advisory: : Updated gdk-pixbuf packages fix denial of service vulnerability | 2004-03-10T14:34:00+00:00 | 2024-11-21T22:59:39+00:00 |
| rhsa-2004:074 | Red Hat Security Advisory: kdelibs security update | 2004-03-10T14:36:00+00:00 | 2025-11-21T17:27:05+00:00 |
| rhsa-2004_074 | Red Hat Security Advisory: kdelibs security update | 2004-03-10T14:36:00+00:00 | 2024-11-21T22:58:57+00:00 |
| rhsa-2004:075 | Red Hat Security Advisory: : Updated kdelibs packages resolve cookie security issue | 2004-03-10T14:37:00+00:00 | 2025-11-21T17:27:08+00:00 |
| rhsa-2004_075 | Red Hat Security Advisory: : Updated kdelibs packages resolve cookie security issue | 2004-03-10T14:37:00+00:00 | 2024-11-21T22:59:01+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-17-341-02 | Rockwell Automation FactoryTalk Alarms and Events | 2017-12-07T00:00:00.000000Z | 2017-12-07T00:00:00.000000Z |
| icsa-17-341-03 | PHOENIX CONTACT FL COMSERVER, FL COM SERVER, and PSI-MODEM/ETH | 2017-12-07T00:00:00.000000Z | 2017-12-07T00:00:00.000000Z |
| icsa-17-353-01 | ABB Ellipse | 2017-12-19T00:00:00.000000Z | 2017-12-19T00:00:00.000000Z |
| icsa-17-353-02 | PEPPERL+FUCHS/ecom instruments WLAN Capable Devices using the WPA2 Protocol | 2017-12-19T00:00:00.000000Z | 2017-12-19T00:00:00.000000Z |
| icsa-17-353-03 | Ecava IntegraXor | 2017-12-19T00:00:00.000000Z | 2017-12-19T00:00:00.000000Z |
| icsa-17-353-04 | Siemens LOGO! Soft Comfort | 2017-12-19T00:00:00.000000Z | 2017-12-19T00:00:00.000000Z |
| icsa-17-353-05 | WECON Technology Co., Ltd. LeviStudio HMI Editor | 2017-12-19T00:00:00.000000Z | 2017-12-19T00:00:00.000000Z |
| icsa-17-355-01 | ICSA-17-355-01_Moxa NPort W2150A and W2250A | 2017-12-21T00:00:00.000000Z | 2017-12-21T00:00:00.000000Z |
| icsa-17-355-02 | Schneider Electric Pelco VideoXpert Enterprise | 2017-12-21T00:00:00.000000Z | 2017-12-21T00:00:00.000000Z |
| icsa-18-004-01 | Delta Electronics Delta Industrial Automation Screen Editor | 2018-01-04T00:00:00.000000Z | 2018-01-04T00:00:00.000000Z |
| icsa-18-004-02a | Advantech WebAccess (Update A) | 2018-01-04T00:00:00.000000Z | 2018-01-11T00:00:00.000000Z |
| icsa-18-009-01 | Rockwell Automation Allen-Bradley MicroLogix 1400 Controllers | 2018-01-09T00:00:00.000000Z | 2018-01-09T00:00:00.000000Z |
| icsa-18-011-01 | WECON Technology Co., Ltd. LeviStudio HMI Editor | 2018-01-11T00:00:00.000000Z | 2018-01-11T00:00:00.000000Z |
| icsa-18-011-02 | Moxa MXview | 2018-01-11T00:00:00.000000Z | 2018-01-11T00:00:00.000000Z |
| icsa-18-011-03 | PHOENIX CONTACT FL SWITCH | 2018-01-11T00:00:00.000000Z | 2018-01-11T00:00:00.000000Z |
| icsa-18-018-01a | ICSA-18-018-01A Siemens SIMATIC WinCC Add-On (Update A) | 2018-01-18T00:00:00.000000Z | 2018-02-22T00:00:00.000000Z |
| icsa-18-023-01 | Advantech WebAccess/SCADA | 2018-01-23T00:00:00.000000Z | 2018-01-23T00:00:00.000000Z |
| icsa-18-023-02 | Siemens Industrial Products (Update A) | 2018-01-23T00:00:00.000000Z | 2019-02-12T00:00:00.000000Z |
| icsa-18-025-02b | Siemens Desigo PXC (Update C) | 2018-01-24T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-18-025-01 | Nari PCS-9611 (Update A) | 2018-01-25T00:00:00.000000Z | 2018-05-03T00:00:00.000000Z |
| icsma-18-025-01 | Philips IntelliSpace Cardiovascular System Vulnerability | 2018-01-25T00:00:00.000000Z | 2018-01-25T00:00:00.000000Z |
| icsa-18-030-01 | PHOENIX CONTACT mGuard | 2018-01-30T00:00:00.000000Z | 2018-01-30T00:00:00.000000Z |
| icsa-18-030-02 | Siemens TeleControl Server Basic | 2018-01-30T00:00:00.000000Z | 2018-01-30T00:00:00.000000Z |
| icsa-18-032-01 | Fuji Electric V-Server VPR | 2018-02-01T00:00:00.000000Z | 2018-02-01T00:00:00.000000Z |
| icsa-18-032-02 | 3S-Smart Software Solutions GmbH CODESYS Web Server | 2018-02-01T00:00:00.000000Z | 2018-02-01T00:00:00.000000Z |
| icsa-18-032-03 | Gemalto Sentinel License Manager | 2018-02-01T00:00:00.000000Z | 2018-02-01T00:00:00.000000Z |
| icsma-18-037-01 | Vyaire Medical CareFusion Upgrade Utility Vulnerability | 2018-02-06T00:00:00.000000Z | 2018-02-06T00:00:00.000000Z |
| icsma-18-037-02 | GE Medical Devices Vulnerability | 2018-02-06T00:00:00.000000Z | 2018-03-13T00:00:00.000000Z |
| icsa-18-044-01 | WAGO PFC200 Series | 2018-02-13T00:00:00.000000Z | 2018-02-13T00:00:00.000000Z |
| icsa-18-044-02 | Schneider Electric IGSS SCADA Software | 2018-02-13T00:00:00.000000Z | 2018-02-13T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-20190619-rv-infodis | Cisco RV110W, RV130W, and RV215W Routers Information Disclosure Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| cisco-sa-20190619-rvrouters-dos | Cisco RV110W, RV130W, and RV215W Routers Management Interface Denial of Service Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| cisco-sa-20190619-sdwan-cmdinj | Cisco SD-WAN Solution Command Injection Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| cisco-sa-20190619-sdwan-privesca | Cisco SD-WAN Solution Privilege Escalation Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| cisco-sa-20190619-sdwan-privilescal | Cisco SD-WAN Solution Privilege Escalation Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| cisco-sa-20190619-staros-asr-dos | Cisco StarOS Denial of Service Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| cisco-sa-20190619-tele-shell-inj | Cisco TelePresence Endpoint Command Shell Injection Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-25T13:24:12+00:00 |
| cisco-sa-20190619-waas-authbypass | Cisco Wide Area Application Services Software HTTPS Proxy Authentication Bypass Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| cisco-sa-20190626-dcnm-bypass | Cisco Data Center Network Manager Authentication Bypass Vulnerability | 2019-06-26T16:00:00+00:00 | 2019-09-19T16:08:37+00:00 |
| cisco-sa-20190626-dcnm-codex | Cisco Data Center Network Manager Arbitrary File Upload and Remote Code Execution Vulnerability | 2019-06-26T16:00:00+00:00 | 2019-09-19T16:08:38+00:00 |
| cisco-sa-20190626-dcnm-file-dwnld | Cisco Data Center Network Manager Arbitrary File Download Vulnerability | 2019-06-26T16:00:00+00:00 | 2019-09-19T16:08:38+00:00 |
| cisco-sa-20190626-dcnm-infodiscl | Cisco Data Center Network Manager Information Disclosure Vulnerability | 2019-06-26T16:00:00+00:00 | 2019-09-19T16:08:39+00:00 |
| cisco-sa-20190703-amp-commandinj | Cisco Advanced Malware Protection for Endpoints Windows Command Injection Vulnerability | 2019-07-03T16:00:00+00:00 | 2019-07-03T16:00:00+00:00 |
| cisco-sa-20190703-asyncos-wsa | Cisco Web Security Appliance Web Proxy Denial of Service Vulnerability | 2019-07-03T16:00:00+00:00 | 2019-07-03T16:00:00+00:00 |
| cisco-sa-20190703-ccapic-restapi | Cisco Application Policy Infrastructure Controller REST API Privilege Escalation Vulnerability | 2019-07-03T16:00:00+00:00 | 2020-01-16T15:25:04+00:00 |
| cisco-sa-20190703-cucdm-rsh | Cisco Unified Communications Domain Manager Restricted Shell Escape Vulnerability | 2019-07-03T16:00:00+00:00 | 2019-07-03T16:00:00+00:00 |
| cisco-sa-20190703-cucm-dos | Cisco Unified Communications Manager Session Initiation Protocol Denial of Service Vulnerability | 2019-07-03T16:00:00+00:00 | 2019-07-08T22:30:23+00:00 |
| cisco-sa-20190703-esa-bypass | Cisco Email Security Appliance Content Filter Bypass Vulnerability | 2019-07-03T16:00:00+00:00 | 2019-07-03T16:00:00+00:00 |
| cisco-sa-20190703-esa-filterpass | Cisco Email Security Appliance Content Filter Bypass Vulnerability | 2019-07-03T16:00:00+00:00 | 2019-07-03T16:00:00+00:00 |
| cisco-sa-20190703-fmc-xss | Cisco Firepower Management Center RSS Cross-Site Scripting Vulnerabilities | 2019-07-03T16:00:00+00:00 | 2019-07-03T16:00:00+00:00 |
| cisco-sa-20190703-iosxr-bgp-dos | Cisco IOS XR Software Border Gateway Protocol Denial of Service Vulnerability | 2019-07-03T16:00:00+00:00 | 2020-01-22T16:01:55+00:00 |
| cisco-sa-20190703-ip-phone-sip-dos | Cisco IP Phone 7800 and 8800 Series Session Initiation Protocol Denial of Service Vulnerability | 2019-07-03T16:00:00+00:00 | 2019-07-08T16:16:46+00:00 |
| cisco-sa-20190703-jabber-dll | Cisco Jabber for Windows DLL Preloading Vulnerability | 2019-07-03T16:00:00+00:00 | 2021-04-01T22:11:38+00:00 |
| cisco-sa-20190703-n9kaci-bypass | Cisco Nexus 9000 Series Fabric Switches ACI Mode Fabric Infrastructure VLAN Unauthorized Access Vulnerability | 2019-07-03T16:00:00+00:00 | 2019-07-03T16:00:00+00:00 |
| cisco-sa-20190703-nfvis-commandinj | Cisco Enterprise NFV Infrastructure Software Command Injection Vulnerability | 2019-07-03T16:00:00+00:00 | 2019-07-03T16:00:00+00:00 |
| cisco-sa-20190703-nfvis-file-readwrite | Cisco Enterprise NFV Infrastructure Software Arbitrary File Read and Write Vulnerability | 2019-07-03T16:00:00+00:00 | 2019-07-03T16:00:00+00:00 |
| cisco-sa-20190703-sbss-dos | Cisco Small Business Series Switches HTTP Denial of Service Vulnerability | 2019-07-03T16:00:00+00:00 | 2019-07-03T16:00:00+00:00 |
| cisco-sa-20190703-sbss-memcorrupt | Cisco Small Business Series Switches Memory Corruption Vulnerability | 2019-07-03T16:00:00+00:00 | 2019-07-03T16:00:00+00:00 |
| cisco-sa-20190703-wsa-dos | Cisco Web Security Appliance HTTPS Certificate Denial of Service Vulnerability | 2019-07-03T16:00:00+00:00 | 2019-07-03T16:00:00+00:00 |
| cisco-sa-20190710-asa-ftd-dos | Cisco ASA and FTD Software Cryptographic TLS and SSL Driver Denial of Service Vulnerability | 2019-07-10T16:00:00+00:00 | 2019-07-11T21:11:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2020-14839 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14844 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-23T00:00:00.000Z |
| msrc_cve-2020-14845 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14846 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-23T00:00:00.000Z |
| msrc_cve-2020-14848 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14852 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Charsets). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14860 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Roles). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N). | 2020-10-02T00:00:00.000Z | 2020-11-02T00:00:00.000Z |
| msrc_cve-2020-14861 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-11-02T00:00:00.000Z |
| msrc_cve-2020-14866 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-11-02T00:00:00.000Z |
| msrc_cve-2020-14867 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 5.6.49 and prior 5.7.31 and prior and 8.0.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-11-02T00:00:00.000Z |
| msrc_cve-2020-14868 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-11-02T00:00:00.000Z |
| msrc_cve-2020-14869 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: LDAP Auth). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14870 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: X Plugin). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14873 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Logging). Supported versions that are affected are 8.0.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14878 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: LDAP Auth). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 8.0 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14888 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-23T00:00:00.000Z |
| msrc_cve-2020-14891 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14893 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-15250 | Information disclosure in JUnit4 | 2020-10-02T00:00:00.000Z | 2025-02-20T00:00:00.000Z |
| msrc_cve-2020-15254 | Undefined Behavior in bounded Crossbeam channel | 2020-10-02T00:00:00.000Z | 2025-09-03T22:22:18.000Z |
| msrc_cve-2020-24352 | An issue was discovered in QEMU through 5.1.0. An out-of-bounds memory access was found in the ATI VGA device implementation. This flaw occurs in the ati_2d_blt() routine in hw/display/ati_2d.c while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could use this flaw to crash the QEMU process on the host resulting in a denial of service. | 2020-10-02T00:00:00.000Z | 2020-11-02T00:00:00.000Z |
| msrc_cve-2020-25613 | An issue was discovered in Ruby through 2.5.8 2.6.x through 2.6.6 and 2.7.x through 2.7.1. WEBrick a simple HTTP server bundled with Ruby had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check) which may lead to an HTTP Request Smuggling attack. | 2020-10-02T00:00:00.000Z | 2020-10-21T00:00:00.000Z |
| msrc_cve-2020-25637 | A double free memory issue was found to occur in the libvirt API in versions before 6.8.0 responsible for requesting information about network interfaces of a running QEMU domain. This flaw affects the polkit access control driver. Specifically clients connecting to the read-write socket with limited ACL permissions could use this flaw to crash the libvirt daemon resulting in a denial of service or potentially escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | 2020-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2020-25641 | A flaw was found in the Linux kernel's implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device resulting in a denial of service. The highest threat from this vulnerability is to system availability. | 2020-10-02T00:00:00.000Z | 2020-10-09T00:00:00.000Z |
| msrc_cve-2020-25643 | A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | 2020-10-02T00:00:00.000Z | 2020-10-17T00:00:00.000Z |
| msrc_cve-2020-25645 | A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality. | 2020-10-02T00:00:00.000Z | 2020-10-17T00:00:00.000Z |
| msrc_cve-2020-25742 | pci_change_irq_level in hw/pci/pci.c in QEMU before 5.1.1 has a NULL pointer dereference because pci_get_bus() might not return a valid pointer. | 2020-10-02T00:00:00.000Z | 2020-10-08T00:00:00.000Z |
| msrc_cve-2020-25743 | hw/ide/pci.c in QEMU before 5.1.1 can trigger a NULL pointer dereference because it lacks a pointer check before an ide_cancel_dma_sync call. | 2020-10-02T00:00:00.000Z | 2020-10-08T00:00:00.000Z |
| msrc_cve-2020-26541 | The Linux kernel through 5.8.13 does not properly enforce the Secure Boot Forbidden Signature Database (aka dbx) protection mechanism. This affects certs/blacklist.c and certs/system_keyring.c. | 2020-10-02T00:00:00.000Z | 2020-10-05T00:00:00.000Z |
| msrc_cve-2020-26570 | The Oberthur smart card software driver in OpenSC before 0.21.0-rc1 has a heap-based buffer overflow in sc_oberthur_read_file. | 2020-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-202104-2081 | Ruijie Networks Co., Ltd. is a professional network manufacturer with a full range of net… | 2022-05-04T09:15:25.755000Z |
| var-202105-1559 | Tianxin Instrument Group Co., Ltd. is a professional service provider of domestic flow me… | 2022-05-04T09:15:25.216000Z |
| var-202105-1580 | S9306 is a routing switch, POE switch. Huawei S9306 has a weak password vulnerability… | 2022-05-04T09:15:25.202000Z |
| var-202105-1601 | Founded in 1987, Huawei is the world's leading provider of ICT (information and communica… | 2022-05-04T09:15:25.191000Z |
| var-202105-1622 | TL-WR1043ND is an 11n wireless router designed for small and medium enterprises, SOHO and… | 2022-05-04T09:15:25.179000Z |
| var-202105-1643 | Founded in 1987, Huawei is the world's leading provider of ICT (information and communica… | 2022-05-04T09:15:25.168000Z |
| var-202105-1664 | NR235P is a type of broadband router for small business equipment. Shenzhen Leike Ind… | 2022-05-04T09:15:25.157000Z |
| var-202105-1685 | Shenzhen Baoruiming Technology Co., Ltd. is a high-tech camera manufacturer integrating R… | 2022-05-04T09:15:25.146000Z |
| var-202105-1706 | Ruijie Networks is a professional network manufacturer with a full range of network equip… | 2022-05-04T09:15:25.136000Z |
| var-202104-1029 | An RFC enabled function module SPI_WAIT_MILLIS in SAP NetWeaver AS ABAP, versions - 731, … | 2022-05-04T09:15:26.320000Z |
| var-202103-1650 | ZTE Corporation is the world's leading provider of integrated communications solutions. … | 2022-05-04T09:15:27.442000Z |
| var-202103-1672 | RT-AX86U is a WiFi6 gaming router. ASUS RT-AX86U has a buffer overflow vulnerability.… | 2022-05-04T09:15:27.432000Z |
| var-202103-1693 | Inhantong InRouter900 series industrial routers are 4G industrial routers. Inhantong … | 2022-05-04T09:15:27.415000Z |
| var-202103-1714 | TL-R479GPE-AC is a router. TP-Link TL-R479GPE-AC has a denial of service vulnerabilit… | 2022-05-04T09:15:27.404000Z |
| var-202103-1735 | Tenda AC9 is a wireless router product. Tenda AC9 has a denial of service vulnerabili… | 2022-05-04T09:15:27.393000Z |
| var-202103-1757 | Cisco is the world's leading provider of network solutions. Cisco rv130w has a binary… | 2022-05-04T09:15:27.382000Z |
| var-202103-1778 | The 360 smart camera PTZ AI version standard AP2C is a device under the 360 smart home pl… | 2022-05-04T09:15:27.371000Z |
| var-202103-1799 | Tianxing Mini is a configuration software product launched by Beijing Tianxing Configurat… | 2022-05-04T09:15:27.362000Z |
| var-202102-1520 | China Mobile Communications Group is affiliated to China Mobile Communications Co., Ltd. … | 2022-05-04T09:15:31.717000Z |
| var-202102-1541 | Cisco RV110W Wireless-N VPN Firewall is an enterprise-level router of Cisco (Cisco). … | 2022-05-04T09:15:31.707000Z |
| var-202102-1562 | Shenzhen Jixiang Tengda Technology Co., Ltd. was founded in 1999. It is a professional su… | 2022-05-04T09:15:31.696000Z |
| var-202102-1583 | TL-ER5110G is a gigabit commercial router. TP-Link router TL-ER5110G has a denial of … | 2022-05-04T09:15:31.685000Z |
| var-202102-1604 | CMCC R3S-3 is a router. China Mobile Internet of Things Co., Ltd. CMCC R3S-3 has logi… | 2022-05-04T09:15:31.674000Z |
| var-202102-1625 | Gargoyle OS is a web management interface for small router devices. Gargoyle OS has a… | 2022-05-04T09:15:31.663000Z |
| var-202101-1977 | As a leading enterprise in China's information security industry, Beijing Top Rongxin Tec… | 2022-05-04T09:15:33.388000Z |
| var-202101-2001 | TP-LINK TL-WR740N adopts advanced 11N wireless technology, with a wireless transmission r… | 2022-05-04T09:15:33.376000Z |
| var-202101-2022 | Shanghai Buke Automation Co., Ltd. has been focusing on the R&D, production, sales and re… | 2022-05-04T09:15:33.366000Z |
| var-202012-1579 | Tenda AC9, AC15, and AC18 are wireless routers. Tenda router has a denial of service … | 2022-05-04T09:15:35.546000Z |
| var-202012-1601 | Rockwell Automation Co., Ltd. is one of the world's largest automation and information co… | 2022-05-04T09:15:35.534000Z |
| var-202012-1622 | Microsoft (Chinese name Microsoft Corporation or American Microsoft Corporation) is an Am… | 2022-05-04T09:15:35.523000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2012-000026 | Janetter vulnerable to information disclosure | 2012-03-19T14:27+09:00 | 2012-03-19T14:27+09:00 |
| jvndb-2012-000027 | Janetter vulnerable to cross-site request forgery | 2012-03-19T14:31+09:00 | 2012-03-19T14:31+09:00 |
| jvndb-2012-000028 | TOSHIBA TEC e-Studio series vulnerable to authentication bypass | 2012-04-05T16:40+09:00 | 2012-04-05T16:40+09:00 |
| jvndb-2012-000029 | SENCHA SNS vulnerable to cross-site request forgery | 2012-04-05T16:41+09:00 | 2012-04-05T16:41+09:00 |
| jvndb-2012-000030 | SENCHA SNS vulnerable to session fixation | 2012-04-05T16:41+09:00 | 2012-04-05T16:41+09:00 |
| jvndb-2012-001932 | Vulnerability in Fujitsu Interstage List Works Where Permissions Cannot Be Denied | 2012-04-11T11:45+09:00 | 2012-04-11T11:45+09:00 |
| jvndb-2012-000032 | Dokodemo Rikunabi 2013 vulnerable to cross-site scripting | 2012-04-13T14:03+09:00 | 2012-04-13T14:03+09:00 |
| jvndb-2012-000031 | ActiveScriptRuby vulnerable to arbitrary Ruby script execution | 2012-04-13T14:08+09:00 | 2012-04-13T14:08+09:00 |
| jvndb-2012-000033 | TwitRocker2 (Android version) vulnerable in the WebView class | 2012-04-20T12:21+09:00 | 2012-04-20T12:21+09:00 |
| jvndb-2012-000034 | Multiple JustSystems products may insecurely load dynamic libraries | 2012-04-24T13:36+09:00 | 2012-04-24T13:36+09:00 |
| jvndb-2012-000035 | Multiple JustSystems products vulnerable to buffer overflow | 2012-04-24T13:37+09:00 | 2012-05-09T19:49+09:00 |
| jvndb-2012-000036 | OSQA vulnerable to cross-site scripting | 2012-04-26T14:15+09:00 | 2012-04-26T14:15+09:00 |
| jvndb-2012-000037 | sp mode mail issue in the verification of SSL certificates | 2012-04-26T14:21+09:00 | 2012-04-26T14:21+09:00 |
| jvndb-2012-002377 | Arbitrary Code Execution Vulnerability in Hitachi COBOL GUI Option on Windows | 2012-05-15T15:14+09:00 | 2012-05-15T15:14+09:00 |
| jvndb-2012-000041 | WEB MART from KENT-WEB vulnerable to cross-site scripting | 2012-05-15T16:44+09:00 | 2012-05-15T16:44+09:00 |
| jvndb-2012-000042 | WEB MART from KENT-WEB vulnerable to cross-site scripting | 2012-05-15T16:53+09:00 | 2012-05-15T16:53+09:00 |
| jvndb-2012-000043 | baserCMS vulnerable to session management | 2012-05-15T16:56+09:00 | 2012-05-15T16:56+09:00 |
| jvndb-2012-000045 | Drupal Form API fails to validate the redirect URL | 2012-05-17T13:55+09:00 | 2012-05-17T13:55+09:00 |
| jvndb-2012-000044 | iLunascape for Android vulnerable in the WebView class | 2012-05-21T13:56+09:00 | 2012-05-21T13:56+09:00 |
| jvndb-2012-000047 | Sybase EAServer vulnerable to cross-site scripting | 2012-05-25T15:34+09:00 | 2012-05-25T15:34+09:00 |
| jvndb-2012-000048 | RSSOwl vulnerable to arbitrary script execution | 2012-05-25T15:37+09:00 | 2012-05-25T15:37+09:00 |
| jvndb-2012-000049 | Opera fails to verify SSL server certificates | 2012-05-25T15:40+09:00 | 2012-07-26T17:31+09:00 |
| jvndb-2012-000050 | Roundcube Webmail vulnerable to cross-site scripting | 2012-05-25T15:43+09:00 | 2012-05-25T15:43+09:00 |
| jvndb-2012-000051 | Logitec LAN-W300N/R series fails to restrict access permissions | 2012-05-25T15:50+09:00 | 2012-05-25T15:50+09:00 |
| jvndb-2012-000052 | Segue vulnerable to cross-site scripting | 2012-06-01T14:03+09:00 | 2012-06-01T14:03+09:00 |
| jvndb-2012-000053 | Segue vulnerable to SQL injection | 2012-06-01T14:06+09:00 | 2012-06-01T14:06+09:00 |
| jvndb-2012-000054 | Puella Magi Madoka Magica iP for Android vulnerable to information disclosure | 2012-06-01T14:09+09:00 | 2012-06-01T14:09+09:00 |
| jvndb-2012-000055 | @WEB ShoppingCart vulnerable to cross-site scripting | 2012-06-05T14:04+09:00 | 2012-06-05T14:04+09:00 |
| jvndb-2012-000058 | WordPress plugin WassUp vulnerable to cross-site scripting | 2012-06-06T12:29+09:00 | 2012-06-06T12:29+09:00 |
| jvndb-2012-000059 | SEIL series fail to restrict access permissions | 2012-06-06T12:39+09:00 | 2012-06-06T12:39+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:4016-1 | Security update for the Linux Kernel (Live Patch 49 for SUSE Linux Enterprise 15 SP3) | 2025-11-10T08:13:30Z | 2025-11-10T08:13:30Z |
| suse-su-2025:4024-1 | Security update for the Linux Kernel (Live Patch 63 for SUSE Linux Enterprise 12 SP5) | 2025-11-10T08:14:25Z | 2025-11-10T08:14:25Z |
| suse-su-2025:4026-1 | Security update for squid | 2025-11-10T09:12:43Z | 2025-11-10T09:12:43Z |
| suse-su-2025:4029-1 | Security update for squid | 2025-11-10T11:44:34Z | 2025-11-10T11:44:34Z |
| suse-su-2025:4035-1 | Security update for erlang26 | 2025-11-10T13:47:05Z | 2025-11-10T13:47:05Z |
| suse-su-2025:4036-1 | Security update for the Linux Kernel (Live Patch 32 for SUSE Linux Enterprise 15 SP4) | 2025-11-10T14:04:15Z | 2025-11-10T14:04:15Z |
| suse-su-2025:4038-1 | Security update for java-1_8_0-openjdk | 2025-11-10T14:22:51Z | 2025-11-10T14:22:51Z |
| suse-su-2025:21054-1 | Security update for runc | 2025-11-10T14:24:22Z | 2025-11-10T14:24:22Z |
| suse-su-2025:21067-1 | Security update for powerpc-utils | 2025-11-10T14:24:22Z | 2025-11-10T14:24:22Z |
| suse-su-2025:21036-1 | Security update for runc | 2025-11-10T14:45:27Z | 2025-11-10T14:45:27Z |
| suse-su-2025:21037-1 | Security update for tiff | 2025-11-10T14:45:27Z | 2025-11-10T14:45:27Z |
| suse-su-2025:21038-1 | Security update for podman | 2025-11-10T14:47:12Z | 2025-11-10T14:47:12Z |
| suse-su-2025:4039-1 | Security update for java-1_8_0-openjdk | 2025-11-10T15:05:07Z | 2025-11-10T15:05:07Z |
| suse-su-2025:4040-1 | Security update for the Linux Kernel (Live Patch 42 for SUSE Linux Enterprise 15 SP4) | 2025-11-10T19:03:48Z | 2025-11-10T19:03:48Z |
| suse-su-2025:4046-1 | Security update for the Linux Kernel (Live Patch 43 for SUSE Linux Enterprise 15 SP4) | 2025-11-11T02:33:47Z | 2025-11-11T02:33:47Z |
| suse-su-2025:4043-1 | Security update for the Linux Kernel (Live Patch 20 for SUSE Linux Enterprise 15 SP5) | 2025-11-11T07:03:50Z | 2025-11-11T07:03:50Z |
| suse-su-2025:4050-1 | Security update for the Linux Kernel (Live Patch 25 for SUSE Linux Enterprise 15 SP5) | 2025-11-11T09:33:48Z | 2025-11-11T09:33:48Z |
| suse-su-2025:4053-1 | Security update for qatengine, qatlib | 2025-11-11T13:46:58Z | 2025-11-11T13:46:58Z |
| suse-su-2025:4054-1 | Security update for ongres-scram | 2025-11-11T14:04:30Z | 2025-11-11T14:04:30Z |
| suse-su-2025:3681-1 | Security update for go1.25 | 2025-11-11T18:34:57Z | 2025-11-11T18:34:57Z |
| suse-su-2025:4056-1 | Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP7) | 2025-11-11T18:35:25Z | 2025-11-11T18:35:25Z |
| suse-su-2025:4057-1 | Security update for the Linux Kernel | 2025-11-11T18:36:09Z | 2025-11-11T18:36:09Z |
| suse-su-2025:4058-1 | Security update for the Linux Kernel (Live Patch 71 for SUSE Linux Enterprise 12 SP5) | 2025-11-11T18:36:17Z | 2025-11-11T18:36:17Z |
| suse-su-2025:4059-1 | Security update for the Linux Kernel (Live Patch 26 for SUSE Linux Enterprise 15 SP5) | 2025-11-11T18:36:30Z | 2025-11-11T18:36:30Z |
| suse-su-2025:4062-1 | Security update for the Linux Kernel (Live Patch 29 for SUSE Linux Enterprise 15 SP5) | 2025-11-11T18:36:41Z | 2025-11-11T18:36:41Z |
| suse-su-2025:4063-1 | Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP6) | 2025-11-12T02:34:57Z | 2025-11-12T02:34:57Z |
| suse-su-2025:4064-1 | Security update for the Linux Kernel (Live Patch 60 for SUSE Linux Enterprise 15 SP3) | 2025-11-12T02:35:06Z | 2025-11-12T02:35:06Z |
| suse-su-2025:4067-1 | Security update for openssh | 2025-11-12T08:03:27Z | 2025-11-12T08:03:27Z |
| suse-su-2025:4068-1 | Security update for lasso | 2025-11-12T08:04:16Z | 2025-11-12T08:04:16Z |
| suse-su-2025:4072-1 | Security update for containerd | 2025-11-12T10:33:38Z | 2025-11-12T10:33:38Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2015-00693 | QPR Portal验证绕过漏洞 | 2015-01-27 | 2015-01-28 |
| cnvd-2015-00694 | iPass Open Mobile Windows Client远程代码执行漏洞 | 2015-01-27 | 2015-01-28 |
| cnvd-2015-00695 | PolarSSL 'asn1parse.c'远程代码执行漏洞 | 2015-01-27 | 2015-01-28 |
| cnvd-2015-00696 | ManageEngine ServiceDesk Plus权限提升漏洞 | 2015-01-27 | 2015-01-28 |
| cnvd-2015-00697 | ManageEngine ServiceDesk Plus 'search' 参数用户枚举漏洞 | 2015-01-27 | 2015-01-28 |
| cnvd-2015-00698 | SAP Adaptive Server Enterprise SQL注入漏洞 | 2015-01-27 | 2015-01-28 |
| cnvd-2015-00699 | SAP NetWeaver AS ABAP XML外部实体漏洞 | 2015-01-27 | 2015-01-28 |
| cnvd-2015-00700 | PrestaShop跨站脚本漏洞(CNVD-2015-00700) | 2015-01-27 | 2015-01-28 |
| cnvd-2015-00709 | Google Chrome Blink拒绝服务漏洞(CNVD-2015-00709) | 2015-01-27 | 2015-01-28 |
| cnvd-2015-00719 | GNU glibc远程堆缓冲区溢出漏洞 | 2015-01-28 | 2015-01-28 |
| cnvd-2015-00721 | Apache Qpid不完整修复拒绝服务漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00722 | Apache Qpid安全绕过漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00723 | Marked模块跨站脚本漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00724 | IBM i Access for Windows本地缓冲区溢出漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00725 | IBM Tivoli Monitoring远程命令执行漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00726 | Bugzilla存在多个漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00727 | Apple MAC OS X Yosemite任意代码执行漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00728 | 多个Android Devices存在拒绝服务漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00729 | Vala 'Gst.MapInfo()'函数拒绝服务漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00730 | Free Reprintables ArticleFR SQL注入漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00731 | Free Reprintables ArticleFR跨站脚本漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00732 | Two Pilots Exif Pilot缓冲区溢出漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00733 | WordPress插件Pixabay Images跨站脚本漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00734 | WordPress插件Pixabay Images目录遍历漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00735 | CatBot SQL注入漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00736 | Joyent Node.js Sequelize SQL注入漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00737 | Joyent Node.js marked不完整黑名单漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00738 | LibTIFF除零错误拒绝服务漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00739 | LibTIFF越界读写拒绝服务漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00740 | Cisco 2900 Series Integrated Services Router拒绝服务漏洞 | 2015-01-28 | 2015-01-29 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTA-2002-AVI-116 | Déni de service sur BIND 9 | 2002-06-05T00:00:00.000000 | 2002-06-05T00:00:00.000000 |
| CERTA-2002-AVI-117 | Vulnérabilité des agents SNMP sous Solaris | 2002-06-05T00:00:00.000000 | 2002-06-05T00:00:00.000000 |
| CERTA-2002-AVI-118 | Vulnérabilité rpc.passwd sous IRIX | 2002-06-05T00:00:00.000000 | 2002-06-05T00:00:00.000000 |
| certa-2002-avi-116 | Déni de service sur BIND 9 | 2002-06-05T00:00:00.000000 | 2002-06-05T00:00:00.000000 |
| certa-2002-avi-117 | Vulnérabilité des agents SNMP sous Solaris | 2002-06-05T00:00:00.000000 | 2002-06-05T00:00:00.000000 |
| certa-2002-avi-118 | Vulnérabilité rpc.passwd sous IRIX | 2002-06-05T00:00:00.000000 | 2002-06-05T00:00:00.000000 |
| CERTA-2002-AVI-119 | Vulnérabilité dans Software Distributor sous HP-UX | 2002-06-10T00:00:00.000000 | 2002-06-10T00:00:00.000000 |
| CERTA-2002-AVI-120 | Débordement de mémoire dans l'application <TT>ASP.NET</TT> de Microsoft | 2002-06-10T00:00:00.000000 | 2002-06-10T00:00:00.000000 |
| certa-2002-avi-119 | Vulnérabilité dans Software Distributor sous HP-UX | 2002-06-10T00:00:00.000000 | 2002-06-10T00:00:00.000000 |
| certa-2002-avi-120 | Débordement de mémoire dans l'application <TT>ASP.NET</TT> de Microsoft | 2002-06-10T00:00:00.000000 | 2002-06-10T00:00:00.000000 |
| CERTA-2002-AVI-121 | Vulnérabilité du module d'administration web du garde-barrière NetScreen-25 | 2002-06-12T00:00:00.000000 | 2002-06-12T00:00:00.000000 |
| certa-2002-avi-121 | Vulnérabilité du module d'administration web du garde-barrière NetScreen-25 | 2002-06-12T00:00:00.000000 | 2002-06-12T00:00:00.000000 |
| CERTA-2002-AVI-122 | Vulnérabilité dans l'annuaire des services RAS et RRAS de Windows | 2002-06-13T00:00:00.000000 | 2002-06-13T00:00:00.000000 |
| CERTA-2002-AVI-123 | Vulnérabilités dans Microsoft SQLXML | 2002-06-13T00:00:00.000000 | 2002-06-13T00:00:00.000000 |
| CERTA-2002-AVI-124 | Vulnérabilité de Microsoft Internet Information Server | 2002-06-13T00:00:00.000000 | 2002-06-13T00:00:00.000000 |
| CERTA-2002-AVI-125 | Vulnérabilité des services snmpd et edd sur la console SSP (SUN Enterprise 10000) | 2002-06-13T00:00:00.000000 | 2002-06-13T00:00:00.000000 |
| CERTA-2002-AVI-126 | Vulnérabilité dans Oracle 9iAS Reports Server | 2002-06-13T00:00:00.000000 | 2002-06-13T00:00:00.000000 |
| CERTA-2002-AVI-127 | Vulnérabilité sur Oracle Net | 2002-06-13T00:00:00.000000 | 2002-06-13T00:00:00.000000 |
| CERTA-2002-AVI-128 | Vulnérabilité du service gopher dans Microsoft Internet Explorer, Proxy Server et ISA Server | 2002-06-13T00:00:00.000000 | 2002-06-18T00:00:00.000000 |
| certa-2002-avi-122 | Vulnérabilité dans l'annuaire des services RAS et RRAS de Windows | 2002-06-13T00:00:00.000000 | 2002-06-13T00:00:00.000000 |
| certa-2002-avi-123 | Vulnérabilités dans Microsoft SQLXML | 2002-06-13T00:00:00.000000 | 2002-06-13T00:00:00.000000 |
| certa-2002-avi-124 | Vulnérabilité de Microsoft Internet Information Server | 2002-06-13T00:00:00.000000 | 2002-06-13T00:00:00.000000 |
| certa-2002-avi-125 | Vulnérabilité des services snmpd et edd sur la console SSP (SUN Enterprise 10000) | 2002-06-13T00:00:00.000000 | 2002-06-13T00:00:00.000000 |
| certa-2002-avi-126 | Vulnérabilité dans Oracle 9iAS Reports Server | 2002-06-13T00:00:00.000000 | 2002-06-13T00:00:00.000000 |
| certa-2002-avi-127 | Vulnérabilité sur Oracle Net | 2002-06-13T00:00:00.000000 | 2002-06-13T00:00:00.000000 |
| certa-2002-avi-128 | Vulnérabilité du service gopher dans Microsoft Internet Explorer, Proxy Server et ISA Server | 2002-06-13T00:00:00.000000 | 2002-06-18T00:00:00.000000 |
| CERTA-2002-AVI-129 | Vulnérabilité de Ghostscript | 2002-06-14T00:00:00.000000 | 2002-06-14T00:00:00.000000 |
| certa-2002-avi-129 | Vulnérabilité de Ghostscript | 2002-06-14T00:00:00.000000 | 2002-06-14T00:00:00.000000 |
| CERTA-2002-AVI-130 | Vulnérabilité sur Apache | 2002-06-18T00:00:00.000000 | 2002-07-11T00:00:00.000000 |
| certa-2002-avi-130 | Vulnérabilité sur Apache | 2002-06-18T00:00:00.000000 | 2002-07-11T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2025-ALE-006 | Vulnérabilité dans les produits Fortinet | 2025-05-13T00:00:00.000000 | 2025-06-24T00:00:00.000000 |
| certfr-2025-ale-006 | Vulnérabilité dans les produits Fortinet | 2025-05-13T00:00:00.000000 | 2025-06-24T00:00:00.000000 |
| CERTFR-2025-ALE-007 | Multiples vulnérabilités dans Ivanti Endpoint Manager Mobile (EPMM) | 2025-05-14T00:00:00.000000 | 2025-06-24T00:00:00.000000 |
| certfr-2025-ale-007 | Multiples vulnérabilités dans Ivanti Endpoint Manager Mobile (EPMM) | 2025-05-14T00:00:00.000000 | 2025-06-24T00:00:00.000000 |
| CERTFR-2025-ALE-008 | [MàJ] Vulnérabilité dans Roundcube | 2025-06-05T00:00:00.000000 | 2025-07-21T00:00:00.000000 |
| certfr-2025-ale-008 | [MàJ] Vulnérabilité dans Roundcube | 2025-06-05T00:00:00.000000 | 2025-07-21T00:00:00.000000 |
| CERTFR-2025-ALE-009 | Multiples vulnérabilités dans Citrix NetScaler ADC et NetScaler Gateway | 2025-07-01T00:00:00.000000 | 2025-07-17T00:00:00.000000 |
| certfr-2025-ale-009 | Multiples vulnérabilités dans Citrix NetScaler ADC et NetScaler Gateway | 2025-07-01T00:00:00.000000 | 2025-07-17T00:00:00.000000 |
| CERTFR-2025-ALE-010 | [MàJ] Multiples vulnérabilités dans Microsoft SharePoint | 2025-07-21T00:00:00.000000 | 2025-08-26T00:00:00.000000 |
| certfr-2025-ale-010 | [MàJ] Multiples vulnérabilités dans Microsoft SharePoint | 2025-07-21T00:00:00.000000 | 2025-08-26T00:00:00.000000 |
| CERTFR-2025-ALE-011 | Incidents de sécurité dans les pare-feux SonicWall | 2025-08-05T00:00:00.000000 | 2025-08-18T00:00:00.000000 |
| certfr-2025-ale-011 | Incidents de sécurité dans les pare-feux SonicWall | 2025-08-05T00:00:00.000000 | 2025-08-18T00:00:00.000000 |
| CERTFR-2025-ALE-012 | Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2025-08-26T00:00:00.000000 | 2025-09-26T00:00:00.000000 |
| certfr-2025-ale-012 | Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2025-08-26T00:00:00.000000 | 2025-09-26T00:00:00.000000 |
| CERTFR-2025-ALE-013 | [MàJ] Multiples vulnérabilités dans Cisco ASA et FTD | 2025-09-25T00:00:00.000000 | 2025-10-06T00:00:00.000000 |
| certfr-2025-ale-013 | [MàJ] Multiples vulnérabilités dans Cisco ASA et FTD | 2025-09-25T00:00:00.000000 | 2025-10-06T00:00:00.000000 |
| CERTFR-2025-ALE-014 | [MàJ] Vulnérabilité dans React Server Components | 2025-12-05T00:00:00.000000 | 2025-12-08T00:00:00.000000 |
| certfr-2025-ale-014 | [MàJ] Vulnérabilité dans React Server Components | 2025-12-05T00:00:00.000000 | 2025-12-08T00:00:00.000000 |