Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2002-1161 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1380. Reason: This candidate is a reservation duplicate of CVE-2002-1380. Notes: none | N/A | N/A | 2002-12-18T05:00:00 | 2004-01-26T10:00:00 |
| CVE-2004-0585 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0589. Reason: This candidate is a duplicate of CVE-2004-0589. Notes: All CVE users should reference CVE-2004-0589 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2004-06-23T04:00:00 | 2004-06-24T09:00:00 |
| CVE-2003-0351 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0306. Reason: This candidate is a reservation duplicate of CVE-2003-0306. Notes: All CVE users should reference CVE-2003-0306 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2004-08-20T04:00:00 | 2004-08-20T09:00:00 |
| CVE-2003-0598 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0657. Reason: This candidate is a reservation duplicate of CVE-2003-0657. Notes: All CVE users should reference CVE-2003-0657 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2003-08-14T04:00:00 | 2004-08-20T09:00:00 |
| CVE-2004-1159 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-1122, CVE-2004-1314. Reason: this was an out-of-band assignment duplicate intended for one issue, but the description and references inadvertently combined multiple issues. Notes: All CVE users should consult CVE-2004-1122 and CVE-2004-1314 to determine which ID is appropriate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2004-12-10T05:00:00 | 2004-12-22T10:00:00 |
| CVE-1999-0020 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-0032. Reason: This candidate is a duplicate of CVE-1999-0032. Notes: All CVE users should reference CVE-1999-0032 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2000-02-04T05:00:00 | 2005-02-04T00:00:00 |
| CVE-1999-0110 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-0315. Reason: This candidate's original description had a typo that delayed it from being detected as a duplicate of CVE-1999-0315. Notes: All CVE users should reference CVE-1999-0315 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2000-02-04T05:00:00 | 2005-02-04T00:00:00 |
| CVE-1999-0187 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-0022. Reason: This candidate is a duplicate of CVE-1999-0022. Notes: All CVE users should reference CVE-1999-0022 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2000-02-04T05:00:00 | 2005-02-04T00:00:00 |
| CVE-1999-1056 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-1395. Reason: This candidate is a duplicate of CVE-1999-1395. Notes: All CVE users should reference CVE-1999-1395 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2001-09-12T04:00:00 | 2005-02-04T00:00:00 |
| CVE-1999-1108 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-1107. Reason: This candidate is a duplicate of CVE-1999-1107. Notes: All CVE users should reference CVE-1999-1107 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2001-09-12T04:00:00 | 2005-02-04T00:00:00 |
| CVE-1999-1310 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-1022. Reason: This candidate is a duplicate of CVE-1999-1022. Notes: All CVE users should reference CVE-1999-1022 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2001-09-12T04:00:00 | 2005-02-04T00:00:00 |
| CVE-2002-0192 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-0193, CVE-2002-1564. Reason: This candidate was published with a description that identified a different vulnerability than what was identified in the original authoritative reference. Notes: Consult CVE-2002-0193 or CVE-2002-1564 to find the identifier for the proper issue | N/A | N/A | 2002-05-17T04:00:00 | 2005-02-04T00:00:00 |
| CVE-2002-0828 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-0862. Reason: This is a duplicate of CVE-2002-0862. Notes: All CVE users should reference CVE-2002-0862 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2002-08-07T04:00:00 | 2005-02-04T00:00:00 |
| CVE-2002-0646 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-0371. Reason: This candidate is a reservation duplicate of CVE-2002-0371. Notes: CVE-2002-0371 should be used instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2002-10-15T04:00:00 | 2005-02-06T10:00:00 |
| CVE-2002-1259 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1286. Reason: This candidate is a reservation duplicate of CVE-2002-1286. Notes: All CVE users should reference CVE-2002-1286 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2002-12-18T05:00:00 | 2005-02-06T10:00:00 |
| CVE-2002-1263 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1295. Reason: This candidate is a reservation duplicate of CVE-2002-1295. Notes: All CVE users should reference CVE-2002-1295 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2003-01-03T05:00:00 | 2005-02-06T10:00:00 |
| CVE-2003-0157 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0138. Reason: This candidate is a reservation duplicate of CVE-2003-0138 due to incomplete coordination. Notes: All CVE users should reference CVE-2003-0138 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2003-03-21T05:00:00 | 2005-02-06T10:00:00 |
| CVE-2003-0158 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0139. Reason: This candidate is a reservation duplicate of CVE-2003-0139 due to incomplete coordination. Notes: All CVE users should reference CVE-2003-0139 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2003-03-21T05:00:00 | 2005-02-06T10:00:00 |
| CVE-2003-0591 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is a duplicate number that was created during the refinement phase. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2003-07-25T04:00:00 | 2005-02-06T10:00:00 |
| CVE-2003-0687 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate has been revoked by its Candidate Numbering Authority (CNA) because it was internally assigned to a problem that was not reachable (the affected routine was not used by the software). Notes: none | N/A | N/A | 2004-06-03T04:00:00 | 2005-02-06T10:00:00 |
| CVE-2003-0790 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: the reported issue is not a vulnerability or exposure. Notes: This candidate was assigned to a "head-reading" bug in a component of fetchmail 6.2.4 and earlier, which was claimed to allow a denial of service. However, the bug is in a broken component of fetchmail that is not "reachable" by any execution path, so it cannot be triggered by any sort of attack and is not exploitable | N/A | N/A | 2003-10-25T04:00:00 | 2005-02-06T10:00:00 |
| CVE-2003-0862 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0813. Reason: This candidate is a duplicate of CVE-2003-0813. Notes: All CVE users should reference CVE-2003-0813 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2003-10-15T04:00:00 | 2005-02-06T10:00:00 |
| CVE-2003-0867 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0662. Reason: This candidate is a duplicate of CVE-2003-0662. Notes: All CVE users should reference CVE-2003-0662 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2003-10-17T04:00:00 | 2005-02-06T10:00:00 |
| CVE-2003-0879 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0518. Reason: This candidate is a reservation duplicate of CVE-2003-0518. Notes: All CVE users should reference CVE-2003-0518 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2003-10-28T05:00:00 | 2005-02-06T10:00:00 |
| CVE-2003-0964 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: N/A. Notes: none | N/A | N/A | 2003-10-01T04:00:00 | 2005-02-06T10:00:00 |
| CVE-2003-1047 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0540. Reason: This candidate is a duplicate of CVE-2004-0540. Notes: All CVE users should reference CVE-2004-0540 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2004-06-08T04:00:00 | 2005-02-06T10:00:00 |
| CVE-2003-1565 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1565. Reason: This candidate is a duplicate of CVE-2002-1565. Notes: All CVE users should reference CVE-2002-1565 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2003-08-05T04:00:00 | 2005-02-06T10:00:00 |
| CVE-2004-0076 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was removed from consideration by its Candidate Numbering Authority. Notes: none | N/A | N/A | 2004-06-03T04:00:00 | 2005-02-06T10:00:00 |
| CVE-2004-0187 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0185. Reason: This candidate is a reservation duplicate of CVE-2004-0185. Notes: All CVE users should reference CVE-2004-0185 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2004-03-04T05:00:00 | 2005-02-06T10:00:00 |
| CVE-2004-0472 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is a reservation duplicate of CVE-2004-0434. Notes: All CVE users should reference CVE-2004-0434 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2004-05-20T04:00:00 | 2005-02-06T10:00:00 |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-1999-0660 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is not about any specific product, protocol, or design, so it is out of scope of CVE. It might be more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A hacker utility, back door, or Trojan Horse is installed on a system, e.g. NetBus, Back Orifice, Rootkit, etc. | N/A | N/A | 2000-02-04T05:00:00 | 2003-03-21T10:00:00 |
| CVE-1999-1056 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-1395. Reason: This candidate is a duplicate of CVE-1999-1395. Notes: All CVE users should reference CVE-1999-1395 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2001-09-12T04:00:00 | 2005-02-04T00:00:00 |
| CVE-1999-1108 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-1107. Reason: This candidate is a duplicate of CVE-1999-1107. Notes: All CVE users should reference CVE-1999-1107 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2001-09-12T04:00:00 | 2005-02-04T00:00:00 |
| CVE-1999-1310 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-1022. Reason: This candidate is a duplicate of CVE-1999-1022. Notes: All CVE users should reference CVE-1999-1022 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2001-09-12T04:00:00 | 2005-02-04T00:00:00 |
| CVE-1999-1594 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none | N/A | N/A | 2020-11-05T19:41:36 | 2020-11-05T19:41:36 |
| CVE-1999-1595 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none | N/A | N/A | 2020-11-05T19:42:07 | 2020-11-05T19:42:07 |
| CVE-1999-1596 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none | N/A | N/A | 2020-11-05T19:42:39 | 2020-11-05T19:42:39 |
| CVE-1999-1597 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none | N/A | N/A | 2020-11-05T19:43:12 | 2020-11-05T19:43:12 |
| CVE-1999-1598 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none | N/A | N/A | 2020-11-05T19:43:30 | 2020-11-05T19:43:30 |
| CVE-2000-0744 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2000-0743. Reason: This candidate is a duplicate of CVE-2000-0743. Notes: All CVE users should reference CVE-2000-0743 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2000-10-13T04:00:00 | 2022-08-17T02:58:08 |
| CVE-2000-1248 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none | N/A | N/A | 2020-11-05T19:44:14 | 2020-11-05T19:44:14 |
| CVE-2000-1249 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none | N/A | N/A | 2020-11-05T19:44:37 | 2020-11-05T19:44:37 |
| CVE-2000-1250 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none | N/A | N/A | 2020-11-05T19:45:01 | 2020-11-05T19:45:01 |
| CVE-2000-1251 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none | N/A | N/A | 2020-11-05T19:45:28 | 2020-11-05T19:45:28 |
| CVE-2000-1252 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none | N/A | N/A | 2020-11-05T19:46:12 | 2020-11-05T19:46:12 |
| CVE-2001-0654 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2001. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2001-0655 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2001. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2001-0656 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2001. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2001-0657 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2001. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2001-0798 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2001. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2001-0802 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2001. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2001-0810 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2001. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2001-0811 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2001. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2001-0812 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2001. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2001-0813 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2001. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2001-0814 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2001. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2001-1121 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2001-1084. Reason: This candidate is a duplicate of CVE-2001-1084. Notes: All CVE users should reference CVE-2001-1084 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2002-06-25T04:00:00 | 2022-08-17T03:00:22 |
| CVE-2001-1167 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2001-0976. Reason: This candidate is a duplicate of CVE-2001-0976. Notes: CVE-2001-0976 should be used instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2002-03-15T05:00:00 | 2002-03-22T10:00:00 |
| CVE-2001-1492 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2001-1460. Reason: This candidate is a refinement duplicate of CVE-2001-1460. Notes: All CVE users should reference CVE-2001-1460 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-06-21T04:00:00 | 2005-07-12T09:00:00 |
| CVE-2001-1588 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none | N/A | N/A | 2020-11-05T19:46:42 | 2020-11-05T19:46:42 |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-1999-0660 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is no… | 1999-01-01T05:00:00.000 | 2023-11-07T01:55:00.443 |
| fkie_cve-1999-1056 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-1395. Reason: This candid… | 1992-12-31T05:00:00.000 | 2023-11-07T01:55:06.290 |
| fkie_cve-1999-1108 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-1107. Reason: This candid… | 1998-11-18T05:00:00.000 | 2023-11-07T01:55:06.680 |
| fkie_cve-1999-1310 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-1022. Reason: This candid… | 1994-11-04T05:00:00.000 | 2023-11-07T01:55:08.250 |
| fkie_cve-1999-1594 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:12.613 | 2023-11-07T01:55:10.620 |
| fkie_cve-1999-1595 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:12.693 | 2023-11-07T01:55:10.873 |
| fkie_cve-1999-1596 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:12.753 | 2023-11-07T01:55:11.093 |
| fkie_cve-1999-1597 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:12.817 | 2023-11-07T01:55:11.307 |
| fkie_cve-1999-1598 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:12.897 | 2023-11-07T01:55:11.520 |
| fkie_cve-2000-0744 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2000-0743. Reason: This candidat… | 2000-10-20T04:00:00.000 | 2023-11-07T01:55:23.877 |
| fkie_cve-2000-1248 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:12.973 | 2023-11-07T01:55:29.043 |
| fkie_cve-2000-1249 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:13.037 | 2023-11-07T01:55:29.257 |
| fkie_cve-2000-1250 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:13.097 | 2023-11-07T01:55:29.467 |
| fkie_cve-2000-1251 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:13.177 | 2023-11-07T01:55:29.743 |
| fkie_cve-2000-1252 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:13.240 | 2023-11-07T01:55:29.953 |
| fkie_cve-2001-0654 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.167 | 2023-11-07T01:55:35.133 |
| fkie_cve-2001-0655 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.197 | 2023-11-07T01:55:35.370 |
| fkie_cve-2001-0656 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.230 | 2023-11-07T01:55:35.600 |
| fkie_cve-2001-0657 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.243 | 2023-11-07T01:55:35.810 |
| fkie_cve-2001-0798 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.277 | 2023-11-07T01:55:37.277 |
| fkie_cve-2001-0802 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.290 | 2023-11-07T01:55:37.520 |
| fkie_cve-2001-0810 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.323 | 2023-11-07T01:55:37.937 |
| fkie_cve-2001-0811 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.353 | 2023-11-07T01:55:38.150 |
| fkie_cve-2001-0812 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.387 | 2023-11-07T01:55:38.367 |
| fkie_cve-2001-0813 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.417 | 2023-11-07T01:55:38.583 |
| fkie_cve-2001-0814 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.433 | 2023-11-07T01:55:38.803 |
| fkie_cve-2001-1121 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2001-1084. Reason: This candidat… | 2001-07-02T04:00:00.000 | 2023-11-07T01:55:41.453 |
| fkie_cve-2001-1167 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2001-0976. Reason: This candid… | 2001-08-28T04:00:00.000 | 2023-11-07T01:55:41.797 |
| fkie_cve-2001-1492 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2001-1460. Reason: This candid… | 2001-12-31T05:00:00.000 | 2023-11-07T01:55:44.577 |
| fkie_cve-2001-1588 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:13.300 | 2023-11-07T01:55:45.377 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-995j-587r-259w |
|
Moderate severity vulnerability that affects rack-mini-profiler | 2018-08-13T20:46:58Z | 2020-06-16T21:42:03Z |
| ghsa-35c4-f3rq-f9g3 |
|
Moderate severity vulnerability that affects activesupport | 2018-09-17T21:57:23Z | 2020-06-16T21:42:52Z |
| ghsa-crvj-3gj9-gm2p |
|
High severity vulnerability that affects qs | 2018-10-09T00:44:29Z | 2020-06-16T21:43:40Z |
| ghsa-qpwj-mvv7-v3m9 |
|
High severity vulnerability that affects org.apache.cxf.fediz:fediz-spring and org.apache.cxf.fediz… | 2018-10-18T16:57:10Z | 2020-06-16T21:52:31Z |
| ghsa-mrhj-2g4v-39qx |
|
Moderate severity vulnerability that affects rails-html-sanitizer | 2018-09-17T21:58:19Z | 2020-06-16T21:54:12Z |
| ghsa-9vc2-p34x-jhxh |
|
Moderate severity vulnerability that affects rack | 2018-09-17T21:56:30Z | 2020-06-16T21:54:47Z |
| ghsa-v76m-f5cx-8rg4 |
|
Moderate severity vulnerability that affects DotNetNuke.Core | 2018-10-16T19:33:25Z | 2020-06-16T21:57:07Z |
| ghsa-v7q8-wvvh-c97p |
|
Moderate severity vulnerability that affects Zope2 | 2018-07-23T19:51:28Z | 2020-06-16T21:57:13Z |
| ghsa-w3gh-g32m-cvhr |
|
High severity vulnerability that affects org.apache.cxf.fediz:fediz-jetty8, org.apache.cxf.fediz:fe… | 2018-10-18T16:56:47Z | 2020-06-16T21:59:21Z |
| ghsa-3233-rgx3-c2wh |
|
Moderate severity vulnerability that affects mustache | 2018-10-09T00:38:09Z | 2020-06-16T21:59:24Z |
| ghsa-w4x9-4f5x-8jj8 |
|
Low severity vulnerability that affects org.apache.hive:hive-exec, org.apache.hive:hive, and o… | 2018-11-21T22:23:29Z | 2020-06-16T21:59:37Z |
| ghsa-whw7-h25v-9qvx |
|
Moderate severity vulnerability that affects org.apache.cxf.fediz:fediz-jetty8, org.apache.cxf.fedi… | 2018-10-18T16:56:38Z | 2020-06-16T22:00:38Z |
| ghsa-xpwp-rq3x-x6v7 |
|
Critical severity vulnerability that affects recurly-api-client | 2018-10-16T17:35:04Z | 2020-06-16T22:03:58Z |
| ghsa-xv6v-72hh-g6g2 |
|
Moderate severity vulnerability that affects org.owasp.antisamy:antisamy | 2018-10-18T17:22:26Z | 2020-06-16T22:04:31Z |
| ghsa-pgv6-jrvv-75jp |
|
Moderate severity vulnerability that affects send | 2018-10-09T00:34:30Z | 2020-06-16T22:04:41Z |
| ghsa-32f7-cmr3-vpjv |
|
Moderate severity vulnerability that affects aioxmpp | 2019-02-07T18:18:30Z | 2020-06-17T15:14:32Z |
| ghsa-5p9f-55j8-922m |
|
Moderate severity vulnerability that affects doorkeeper | 2018-08-13T20:49:10Z | 2020-06-17T15:14:35Z |
| ghsa-82x2-g7vr-39wq |
|
Moderate severity vulnerability that affects web-console | 2018-08-13T20:48:09Z | 2020-06-17T15:14:38Z |
| ghsa-8474-rc7c-wrhp |
|
High severity vulnerability that affects safemode | 2018-08-08T22:29:10Z | 2020-06-17T15:14:40Z |
| ghsa-9wcm-rrvh-qjc8 |
|
High severity vulnerability that affects colorscore | 2018-08-15T20:03:53Z | 2020-06-17T15:14:43Z |
| ghsa-g6f4-j6c2-w3p3 |
|
High severity vulnerability that affects uglify-js | 2018-10-09T00:39:43Z | 2020-06-17T15:14:46Z |
| ghsa-hm48-76wh-q86v |
|
High severity vulnerability that affects activerecord | 2018-08-21T19:03:17Z | 2020-06-17T15:14:48Z |
| ghsa-hxf5-mg84-pj4m |
|
Moderate severity vulnerability that affects moment | 2018-07-31T23:03:17Z | 2020-06-17T15:14:53Z |
| ghsa-qc8j-m8j3-rjq6 |
|
Moderate severity vulnerability that affects rails-html-sanitizer | 2018-09-17T21:57:58Z | 2020-06-17T15:15:01Z |
| ghsa-qf5x-qgx7-437h |
|
Moderate severity vulnerability that affects actionpack | 2018-09-17T21:54:11Z | 2020-06-17T15:15:04Z |
| ghsa-r53m-pfr5-7v87 |
|
Moderate severity vulnerability that affects org.apache.tomcat.embed:tomcat-embed-core | 2019-04-18T14:50:19Z | 2020-06-17T15:15:06Z |
| ghsa-vxp4-25qp-86qh |
|
Moderate severity vulnerability that affects ember | 2017-10-24T18:33:36Z | 2020-06-17T15:15:14Z |
| ghsa-w655-w578-99pq |
|
High severity vulnerability that affects espeak-ruby | 2018-08-21T17:09:08Z | 2020-06-17T15:15:17Z |
| ghsa-wxvm-fh75-mpgr |
|
Critical severity vulnerability that affects dns-sync | 2018-07-26T16:24:34Z | 2020-06-17T15:15:19Z |
| ghsa-9959-c6q6-6qp3 |
|
Moderate severity vulnerability that affects validator | 2017-10-24T18:33:36Z | 2020-06-17T16:30:41Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2019-13 |
|
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x b… | django | 2019-08-09T13:15:00Z | 2019-08-28T13:15:00Z |
| pysec-2019-104 |
|
** DISPUTED ** core.py in Mitogen before 0.2.8 has a typo that drops the unidirectional-r… | mitogen | 2019-08-18T20:15:00Z | 2019-08-30T11:38:00Z |
| pysec-2019-23 |
|
All versions of the HTTPie package prior to version 1.0.3 are vulnerable to Open Redirect… | httpie | 2019-08-23T17:15:00Z | 2019-09-02T18:15:00Z |
| pysec-2019-140 |
|
Pallets Werkzeug before 0.15.3, when used with Docker, has insufficient debugger PIN rand… | werkzeug | 2019-08-09T15:15:00Z | 2019-09-11T00:15:00Z |
| pysec-2019-133 |
|
The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired s… | urllib3 | 2019-04-18T21:29:00Z | 2019-09-14T18:15:00Z |
| pysec-2019-126 |
|
** DISPUTED ** In Supervisor through 4.0.2, an unauthenticated user can read log files or… | supervisor | 2019-09-10T17:15:00Z | 2019-09-17T22:15:00Z |
| pysec-2019-108 |
|
** DISPUTED ** An issue was discovered in NumPy 1.16.0 and earlier. It uses the pickle … | numpy | 2019-01-16T05:29:00Z | 2019-10-01T00:15:00Z |
| pysec-2019-41 |
|
psutil (aka python-psutil) through 5.6.5 can have a double free. This occurs because of r… | psutil | 2019-11-12T02:15:00Z | 2019-11-18T21:15:00Z |
| pysec-2019-116 |
|
Uncontrolled deserialization of a pickled object in models.py in Frost Ming rediswrapper … | rediswrapper | 2019-10-05T23:15:00Z | 2019-12-09T19:06:00Z |
| pysec-2017-50 |
|
Lemur 0.1.4 does not use sufficient entropy in its IV when encrypting AES in CBC mode. | lemur | 2017-08-09T16:29:00Z | 2019-12-11T21:22:00Z |
| pysec-2019-105 |
|
The modoboa-dmarc plugin 1.1.0 for Modoboa is vulnerable to an XML External Entity Inject… | modoboa-dmarc | 2019-12-10T20:15:00Z | 2019-12-19T15:11:00Z |
| pysec-2019-173 |
|
In Apache Incubator Superset before 0.32, a user can view database names that he has no a… | apache-superset | 2019-12-16T22:15:00Z | 2019-12-19T18:24:00Z |
| pysec-2019-29 |
|
OpenStack Keystone 15.0.0 and 16.0.0 is affected by Data Leakage in the list credentials … | keystone | 2019-12-09T18:15:00Z | 2019-12-20T00:15:00Z |
| pysec-2019-112 |
|
In Archery before 1.3, inserting an XSS payload into a project name (either by creating a… | pyarchery | 2019-12-26T23:15:00Z | 2020-01-02T14:27:00Z |
| pysec-2019-16 |
|
Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A … | django | 2019-12-18T19:15:00Z | 2020-01-08T04:15:00Z |
| pysec-2019-125 |
|
Valve Steam Client before 2019-09-12 allows placing or appending partially controlled fil… | steam | 2019-10-04T20:15:00Z | 2020-01-16T13:15:00Z |
| pysec-2020-162 |
|
In Apache Airflow before 1.10.5 when running with the "classic" UI, a malicious admin use… | apache-airflow | 2020-01-14T17:15:00Z | 2020-01-21T16:21:00Z |
| pysec-2020-146 |
|
TUF (aka The Update Framework) 0.7.2 through 0.12.1 allows Uncontrolled Resource Consumption. | tuf | 2020-01-14T19:15:00Z | 2020-01-21T19:55:00Z |
| pysec-2020-85 |
|
An open redirect on the login form (and possibly other places) in Plone 4.0 through 5.2.1… | plone | 2020-01-23T21:15:00Z | 2020-01-24T21:32:00Z |
| pysec-2020-90 |
|
A privilege escalation issue in plone.app.contenttypes in Plone 4.3 through 5.2.1 allows … | plone | 2020-01-23T21:15:00Z | 2020-01-24T22:44:00Z |
| pysec-2020-89 |
|
Missing password strength checks on some forms in Plone 4.3 through 5.2.0 allow users to … | plone | 2020-01-23T21:15:00Z | 2020-01-24T22:52:00Z |
| pysec-2020-88 |
|
SQL Injection in DTML or in connection objects in Plone 4.0 through 5.2.1 allows users to… | plone | 2020-01-23T21:15:00Z | 2020-01-24T23:00:00Z |
| pysec-2020-87 |
|
plone.restapi in Plone 5.2.0 through 5.2.1 allows users with a certain privilege level to… | plone | 2020-01-23T21:15:00Z | 2020-01-24T23:03:00Z |
| pysec-2020-86 |
|
An XSS issue in the title field in Plone 5.0 through 5.2.1 allows users with a certain pr… | plone | 2020-01-23T21:15:00Z | 2020-01-24T23:07:00Z |
| pysec-2020-94 |
|
PySAML2 before 5.0.0 does not check that the signature in a SAML document is enveloped an… | pysaml2 | 2020-01-13T19:15:00Z | 2020-01-27T18:15:00Z |
| pysec-2020-178 |
|
Waitress through version 1.3.1 allows request smuggling by sending the Content-Length hea… | waitress | 2020-01-22T19:15:00Z | 2020-01-30T17:07:00Z |
| pysec-2020-81 |
|
libImaging/TiffDecode.c in Pillow before 6.2.2 has a TIFF decoding integer overflow, rela… | pillow | 2020-01-03T01:15:00Z | 2020-01-31T04:15:00Z |
| pysec-2020-156 |
|
flaskparser.py in Webargs 5.x through 5.5.2 doesn't check that the Content-Type header is… | webargs | 2020-01-29T15:15:00Z | 2020-02-03T16:36:00Z |
| pysec-2019-22 |
|
A flaw was found in IPA, all 4.6.x versions before 4.6.7, all 4.7.x versions before 4.7.4… | freeipa | 2019-11-27T08:15:00Z | 2020-02-05T00:15:00Z |
| pysec-2019-28 |
|
A flaw was found in IPA, all 4.6.x versions before 4.6.7, all 4.7.x versions before 4.7.4… | ipa | 2019-11-27T09:15:00Z | 2020-02-05T00:15:00Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2012-6497 | Ruby on Rails contains a flaw in the Authlogic gem. The issue is triggered when the progr… | 2012-12-21T00:00:00.000Z |
| gsd-2012-6496 | Due to the way dynamic finders in Active Record extract options from method parameters, a… | 2012-12-22T00:00:00.000Z |
| gsd-2013-0183 | multipart/parser.rb in Rack 1.3.x before 1.3.8 and 1.4.x before 1.4.3 allows remote attac… | 2013-01-07T00:00:00.000Z |
| gsd-2013-0155 | Ruby on Rails 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not … | 2013-01-08T00:00:00.000Z |
| gsd-2013-0156 | active_support/core_ext/hash/conversions.rb in Ruby on Rails before 2.3.15, 3.0.x before … | 2013-01-08T00:00:00.000Z |
| gsd-2013-1802 | extlib Gem for Ruby contains a flaw that is triggered when a type casting error occurs du… | 2013-01-08T00:00:00.000Z |
| gsd-2013-1800 | The crack gem 0.3.1 and earlier for Ruby does not properly restrict casts of string value… | 2013-01-09T00:00:00.000Z |
| gsd-2013-0285 | The Ruby Gem nori has a parameter parsing error that may allow an attacker to execute arb… | 2013-01-10T00:00:00.000Z |
| gsd-2013-0175 | The multi_xml Gem for Ruby contains a flaw that is triggered when an error occurs during … | 2013-01-11T00:00:00.000Z |
| gsd-2013-0184 | Unspecified vulnerability in Rack::Auth::AbstractRequest in Rack 1.1.x before 1.1.5, 1.2.… | 2013-01-13T00:00:00.000Z |
| gsd-2013-1801 | httparty Gem for Ruby contains a flaw that is triggered when a type casting error occurs … | 2013-01-14T00:00:00.000Z |
| gsd-2013-0233 | Devise contains a flaw that is triggered during when a type conversion error occurs durin… | 2013-01-28T00:00:00.000Z |
| gsd-2013-0333 | lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x before 2.3.16 and 3.0.x b… | 2013-01-28T00:00:00.000Z |
| gsd-2013-0256 | darkfish.js in RDoc 2.3.0 through 3.12 and 4.x before 4.0.0.preview2.1, as used in Ruby, … | 2013-02-06T00:00:00.000Z |
| gsd-2013-0262 | rack/file.rb (Rack::File) in Rack 1.5.x before 1.5.2 and 1.4.x before 1.4.5 allows attack… | 2013-02-07T00:00:00.000Z |
| gsd-2013-0263 | Rack::Session::Cookie in Rack 1.5.x before 1.5.2, 1.4.x before 1.4.5, 1.3.x before 1.3.10… | 2013-02-07T00:00:00.000Z |
| gsd-2013-0276 | ActiveRecord in Ruby on Rails before 2.3.17, 3.1.x before 3.1.11, and 3.2.x before 3.2.12… | 2013-02-11T00:00:00.000Z |
| gsd-2013-0277 | ActiveRecord in Ruby on Rails before 2.3.17 and 3.x before 3.1.0 allows remote attackers … | 2013-02-11T00:00:00.000Z |
| gsd-2013-0269 | The JSON gem before 1.5.5, 1.6.x before 1.6.8, and 1.7.x before 1.7.7 for Ruby allows rem… | 2013-02-12T00:00:00.000Z |
| gsd-2013-1756 | Dragonfly Gem for Ruby contains a flaw that is triggered during the parsing of a speciall… | 2013-02-19T00:00:00.000Z |
| gsd-2013-0162 | The diff_pp function in lib/gauntlet_rubyparser.rb in the ruby_parser gem 3.1.1 and earli… | 2013-02-21T00:00:00.000Z |
| gsd-2013-1607 | PDFKit Gem for Ruby contains a flaw that is due to the program failing to properly valida… | 2013-02-21T00:00:00.000Z |
| gsd-2013-1656 | Spree Commerce 1.0.x through 1.3.2 allows remote authenticated administrators to instanti… | 2013-02-21T00:00:00.000Z |
| gsd-2013-2506 | Spree contains a flaw that leads to unauthorized privileges being gained. The issue is tr… | 2013-02-21T00:00:00.000Z |
| gsd-2013-2512 | ftpd Gem for Ruby contains a flaw that is triggered when handling a specially crafted opt… | 2013-02-28T00:00:00.000Z |
| gsd-2013-2516 | fileutils Gem for Ruby contains a flaw in file_utils.rb. The issue is triggered when hand… | 2013-02-28T00:00:00.000Z |
| gsd-2013-2513 | flash_tool Gem for Ruby contains a flaw that is triggered during the handling of download… | 2013-03-04T00:00:00.000Z |
| gsd-2013-2616 | MiniMagick Gem for Ruby contains a flaw that is triggered during the handling of speciall… | 2013-03-12T00:00:00.000Z |
| gsd-2013-2617 | lib/curl.rb in the Curl Gem for Ruby allows remote attackers to execute arbitrary command… | 2013-03-12T00:00:00.000Z |
| gsd-2013-2615 | fastreader Gem for Ruby contains a flaw that is triggered during the handling of speciall… | 2013-03-13T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| MAL-2022-870 | Malicious code in adroit-websdk-client (npm) | 2022-05-16T06:46:03Z | 2022-05-16T06:46:04Z |
| mal-2022-870 | Malicious code in adroit-websdk-client (npm) | 2022-05-16T06:46:03Z | 2022-05-16T06:46:04Z |
| MAL-2022-2953 | Malicious code in f0-utils (npm) | 2022-05-16T06:46:05Z | 2022-05-16T06:46:05Z |
| mal-2022-2953 | Malicious code in f0-utils (npm) | 2022-05-16T06:46:05Z | 2022-05-16T06:46:05Z |
| MAL-2022-2707 | Malicious code in elysium-ui (npm) | 2022-05-16T06:46:05Z | 2022-05-16T06:46:06Z |
| MAL-2022-869 | Malicious code in adroit-f0-components (npm) | 2022-05-16T06:46:05Z | 2022-05-16T06:46:06Z |
| mal-2022-2707 | Malicious code in elysium-ui (npm) | 2022-05-16T06:46:05Z | 2022-05-16T06:46:06Z |
| mal-2022-869 | Malicious code in adroit-f0-components (npm) | 2022-05-16T06:46:05Z | 2022-05-16T06:46:06Z |
| MAL-2022-1577 | Malicious code in binance-connector-node (npm) | 2022-05-16T06:46:18Z | 2022-05-16T06:46:19Z |
| mal-2022-1577 | Malicious code in binance-connector-node (npm) | 2022-05-16T06:46:18Z | 2022-05-16T06:46:19Z |
| MAL-2022-6524 | Malicious code in testingx (npm) | 2022-05-16T06:46:35Z | 2022-05-16T06:46:35Z |
| mal-2022-6524 | Malicious code in testingx (npm) | 2022-05-16T06:46:35Z | 2022-05-16T06:46:35Z |
| MAL-2022-998 | Malicious code in angieslist-gulp-build-tasks (npm) | 2022-05-16T06:46:35Z | 2022-05-16T06:46:36Z |
| mal-2022-998 | Malicious code in angieslist-gulp-build-tasks (npm) | 2022-05-16T06:46:35Z | 2022-05-16T06:46:36Z |
| MAL-2022-2609 | Malicious code in dummy-preprocessor (npm) | 2022-05-16T06:47:07Z | 2022-05-16T06:47:08Z |
| mal-2022-2609 | Malicious code in dummy-preprocessor (npm) | 2022-05-16T06:47:07Z | 2022-05-16T06:47:08Z |
| MAL-2022-3279 | Malicious code in gatsby-plugin-added-by-parent-theme (npm) | 2022-05-16T06:47:08Z | 2022-05-16T06:47:09Z |
| mal-2022-3279 | Malicious code in gatsby-plugin-added-by-parent-theme (npm) | 2022-05-16T06:47:08Z | 2022-05-16T06:47:09Z |
| MAL-2022-3502 | Malicious code in gulp-browserify-thin (npm) | 2022-05-16T06:47:08Z | 2022-05-16T06:47:15Z |
| mal-2022-3502 | Malicious code in gulp-browserify-thin (npm) | 2022-05-16T06:47:08Z | 2022-05-16T06:47:15Z |
| MAL-2022-2020 | Malicious code in colors-update (npm) | 2022-05-16T07:05:12Z | 2022-05-16T07:06:31Z |
| mal-2022-2020 | Malicious code in colors-update (npm) | 2022-05-16T07:05:12Z | 2022-05-16T07:06:31Z |
| MAL-2022-230 | Malicious code in @epc-apps/alert-servie (npm) | 2022-05-16T07:13:06Z | 2022-05-16T07:13:06Z |
| MAL-2022-232 | Malicious code in @epc-apps/api-ingestor (npm) | 2022-05-16T07:13:06Z | 2022-05-16T07:13:06Z |
| mal-2022-230 | Malicious code in @epc-apps/alert-servie (npm) | 2022-05-16T07:13:06Z | 2022-05-16T07:13:06Z |
| mal-2022-232 | Malicious code in @epc-apps/api-ingestor (npm) | 2022-05-16T07:13:06Z | 2022-05-16T07:13:06Z |
| MAL-2022-234 | Malicious code in @epc-apps/api-outages (npm) | 2022-05-16T07:13:11Z | 2022-05-16T07:13:12Z |
| MAL-2022-243 | Malicious code in @epc-infra/users-stack (npm) | 2022-05-16T07:13:11Z | 2022-05-16T07:13:12Z |
| mal-2022-234 | Malicious code in @epc-apps/api-outages (npm) | 2022-05-16T07:13:11Z | 2022-05-16T07:13:12Z |
| mal-2022-243 | Malicious code in @epc-infra/users-stack (npm) | 2022-05-16T07:13:11Z | 2022-05-16T07:13:12Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2022-2216 | Camunda: Schwachstelle ermöglicht Redirect-Angriff | 2022-12-01T23:00:00.000+00:00 | 2022-12-01T23:00:00.000+00:00 |
| wid-sec-w-2022-1683 | Microsoft Developer Tools: Mehrere Schwachstellen | 2022-10-11T22:00:00.000+00:00 | 2022-12-04T23:00:00.000+00:00 |
| wid-sec-w-2022-1788 | WordPress: Mehrere Schwachstellen | 2022-10-18T22:00:00.000+00:00 | 2022-12-04T23:00:00.000+00:00 |
| wid-sec-w-2022-2223 | Veritas NetBackup Flex Scale und Access Appliance: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2022-12-04T23:00:00.000+00:00 | 2022-12-04T23:00:00.000+00:00 |
| wid-sec-w-2022-2172 | ILIAS: Mehrere Schwachstellen | 2022-11-24T23:00:00.000+00:00 | 2022-12-05T23:00:00.000+00:00 |
| wid-sec-w-2022-2221 | Google Chrome und Microsoft Edge: Schwachstelle ermöglicht Codeausführung | 2022-12-04T23:00:00.000+00:00 | 2022-12-05T23:00:00.000+00:00 |
| wid-sec-w-2022-2225 | Intel BIOS: Mehrere Schwachstellen | 2022-02-08T23:00:00.000+00:00 | 2022-12-05T23:00:00.000+00:00 |
| wid-sec-w-2022-2231 | Intel Server Boards BMC Firmware: Mehrere Schwachstellen | 2022-12-05T23:00:00.000+00:00 | 2022-12-05T23:00:00.000+00:00 |
| wid-sec-w-2022-2232 | IBM InfoSphere Information Server: Schwachstelle ermöglicht Codeausführung | 2022-12-05T23:00:00.000+00:00 | 2022-12-05T23:00:00.000+00:00 |
| wid-sec-w-2022-2233 | Zyxel Firewall: Schwachstelle ermöglicht Cross-Site Scripting | 2022-12-05T23:00:00.000+00:00 | 2022-12-05T23:00:00.000+00:00 |
| wid-sec-w-2022-2235 | Veeam Backup & Replication: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2022-12-05T23:00:00.000+00:00 | 2022-12-05T23:00:00.000+00:00 |
| wid-sec-w-2022-2237 | Ivanti Endpoint Manager: Schwachstelle ermöglicht Privilegieneskalation | 2022-12-05T23:00:00.000+00:00 | 2022-12-05T23:00:00.000+00:00 |
| wid-sec-w-2022-2239 | Microsoft Edge: Mehrere Schwachstellen | 2022-12-05T23:00:00.000+00:00 | 2022-12-05T23:00:00.000+00:00 |
| wid-sec-w-2022-1589 | Mozilla Thunderbird: Mehrere Schwachstellen | 2022-09-29T22:00:00.000+00:00 | 2022-12-06T23:00:00.000+00:00 |
| wid-sec-w-2022-2230 | Avast und AVG Antivirus: Schwachstelle ermöglicht Privilegieneskalation | 2022-12-05T23:00:00.000+00:00 | 2022-12-06T23:00:00.000+00:00 |
| wid-sec-w-2022-2240 | mutt: Schwachstelle ermöglicht Denial of Service | 2021-01-19T23:00:00.000+00:00 | 2022-12-06T23:00:00.000+00:00 |
| wid-sec-w-2022-2244 | mutt: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2020-06-15T22:00:00.000+00:00 | 2022-12-06T23:00:00.000+00:00 |
| wid-sec-w-2022-2245 | mutt: Schwachstelle ermöglicht Umgehung von Sicherheitsvorkehrungen | 2020-06-14T22:00:00.000+00:00 | 2022-12-06T23:00:00.000+00:00 |
| wid-sec-w-2022-2249 | IBM Spectrum Scale: Schwachstelle ermöglicht Codeausführung | 2022-12-06T23:00:00.000+00:00 | 2022-12-06T23:00:00.000+00:00 |
| wid-sec-w-2022-2251 | Aruba ClearPass Policy Manager: Mehrere Schwachstellen | 2022-12-06T23:00:00.000+00:00 | 2022-12-06T23:00:00.000+00:00 |
| wid-sec-w-2022-2252 | Redmine.org Redmine: Mehrere Schwachstellen | 2022-12-06T23:00:00.000+00:00 | 2022-12-06T23:00:00.000+00:00 |
| wid-sec-w-2022-2253 | Fortinet FortiSandbox: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2022-12-06T23:00:00.000+00:00 | 2022-12-06T23:00:00.000+00:00 |
| wid-sec-w-2022-2254 | Fortinet FortiOS: Schwachstelle ermöglicht Cross-Site Scripting | 2022-12-06T23:00:00.000+00:00 | 2022-12-06T23:00:00.000+00:00 |
| wid-sec-w-2022-2255 | Fortinet FortiOS: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2022-12-06T23:00:00.000+00:00 | 2022-12-06T23:00:00.000+00:00 |
| wid-sec-w-2022-0150 | libTIFF: Mehrere Schwachstellen ermöglichen Denial of Service | 2022-02-14T23:00:00.000+00:00 | 2022-12-07T23:00:00.000+00:00 |
| wid-sec-w-2022-0311 | Linux Kernel: Mehrere Schwachstellen | 2019-12-01T23:00:00.000+00:00 | 2022-12-07T23:00:00.000+00:00 |
| wid-sec-w-2022-0315 | Linux Kernel: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten | 2021-05-30T22:00:00.000+00:00 | 2022-12-07T23:00:00.000+00:00 |
| wid-sec-w-2022-0439 | Red Hat OpenStack: Mehrere Schwachstellen | 2022-06-22T22:00:00.000+00:00 | 2022-12-07T23:00:00.000+00:00 |
| wid-sec-w-2022-0456 | tribe29 checkmk: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2022-06-23T22:00:00.000+00:00 | 2022-12-07T23:00:00.000+00:00 |
| wid-sec-w-2022-0728 | libTIFF: Schwachstelle ermöglicht Denial of Service | 2022-01-09T23:00:00.000+00:00 | 2022-12-07T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2024-0248 | Kwetsbaarheden verholpen in Microsoft Windows | 2024-06-11T18:06:57.087085Z | 2024-06-11T18:11:31.381556Z |
| ncsc-2024-0249 | Kwetsbaarheden verholpen in Microsoft Azure | 2024-06-11T18:15:29.806897Z | 2024-06-11T18:15:29.806897Z |
| ncsc-2024-0250 | Kwetsbaarheden verholpen in Microsoft Visual Studio | 2024-06-11T18:18:10.131111Z | 2024-06-11T18:18:10.131111Z |
| ncsc-2024-0251 | Kwetsbaarheden verholpen in Microsoft Office | 2024-06-11T18:20:51.628241Z | 2024-06-11T18:20:51.628241Z |
| ncsc-2024-0252 | Kwetsbaarheden verholpen in Microsoft Dynamics | 2024-06-11T18:23:19.082621Z | 2024-06-11T18:23:19.082621Z |
| ncsc-2024-0253 | Kwetsbaarheid verholpen in Adobe Photoshop | 2024-06-13T13:31:15.643260Z | 2024-06-13T13:31:15.643260Z |
| ncsc-2024-0254 | Kwetsbaarheden verholpen in Adobe FrameMaker Publishing Server | 2024-06-13T13:34:41.831468Z | 2024-06-13T13:34:41.831468Z |
| ncsc-2024-0256 | Kwetsbaarheden verholpen in Adobe ColdFusion | 2024-06-13T13:37:57.490381Z | 2024-06-13T13:37:57.490381Z |
| ncsc-2024-0257 | Kwetsbaarheid verholpen in Adobe Creative Cloud Desktop Application | 2024-06-14T06:27:08.002611Z | 2024-06-14T06:27:08.002611Z |
| ncsc-2024-0258 | Kwetsbaarheden verholpen in GitLab Enterprise Edition en Community Edition | 2024-06-14T06:28:31.318295Z | 2024-06-14T06:28:31.318295Z |
| ncsc-2024-0259 | Kwetsbaarheden verholpen in Adobe Experience Manager | 2024-06-14T06:30:30.926535Z | 2024-06-14T06:30:30.926535Z |
| ncsc-2024-0260 | Kwetsbaarheden verholpen in Nvidia GPU Drivers | 2024-06-14T06:34:54.620125Z | 2024-06-14T06:34:54.620125Z |
| ncsc-2024-0236 | Kwetsbaarheden verholpen in Ivanti Endpoint Manager | 2024-05-27T07:11:10.705670Z | 2024-06-14T09:37:49.413035Z |
| ncsc-2024-0261 | Kwetsbaarheid verholpen in Fortinet FortiOS | 2024-06-14T09:59:56.652183Z | 2024-06-14T09:59:56.652183Z |
| ncsc-2024-0262 | Kwetsbaarheden verholpen in VMware vCenter | 2024-06-18T11:46:03.858476Z | 2024-06-18T11:46:03.858476Z |
| ncsc-2024-0263 | Kwetsbaarheden verholpen in Autodesk Autocad | 2024-06-20T14:09:54.121906Z | 2024-06-20T14:09:54.121906Z |
| ncsc-2024-0264 | Kwetsbaarheden verholpen in Avaya IP Office | 2024-06-25T10:17:16.686897Z | 2024-06-25T10:17:16.686897Z |
| ncsc-2024-0265 | Kwetsbaarheid verholpen in XWiki | 2024-06-25T10:17:56.645201Z | 2024-06-25T10:17:56.645201Z |
| ncsc-2024-0266 | Kwetsbaarheden verholpen in WordPress | 2024-06-25T12:19:50.298884Z | 2024-06-25T12:19:50.298884Z |
| ncsc-2024-0267 | Kwetsbaarheden verholpen in Progress MOVEit | 2024-06-26T07:27:55.195431Z | 2024-06-26T08:58:01.371553Z |
| ncsc-2024-0271 | Kwetsbaarheid verholpen in Juniper Session Smart Router | 2024-06-28T09:55:17.082602Z | 2024-06-28T09:55:17.082602Z |
| ncsc-2024-0255 | Kwetsbaarheden verholpen in Adobe Commerce | 2024-06-13T13:36:13.246216Z | 2024-07-01T07:10:59.549847Z |
| ncsc-2024-0272 | Kwetsbaarheid verholpen in OpenSSH | 2024-07-01T12:21:57.127505Z | 2024-07-01T15:37:23.231069Z |
| ncsc-2024-0273 | Kwetsbaarheden ontdekt in Kiloview P1 4G Video Encoder en P2 4G Video Encoder | 2024-07-02T07:04:39.395441Z | 2024-07-02T07:04:39.395441Z |
| ncsc-2024-0275 | Kwetsbaarheden verholpen in Apache HHTP-server | 2024-07-02T11:44:22.653047Z | 2024-07-02T11:44:22.653047Z |
| ncsc-2024-0276 | Kwetsbaarheden verholpen in Splunk | 2024-07-02T13:15:06.374293Z | 2024-07-02T13:15:06.374293Z |
| ncsc-2024-0277 | Kwetsbaarheid verholpen in Juniper JunOS | 2024-07-03T07:16:21.498075Z | 2024-07-03T07:16:21.498075Z |
| ncsc-2024-0278 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2024-07-03T07:21:50.013074Z | 2024-07-03T07:21:50.013074Z |
| ncsc-2024-0270 | Kwetsbaarheden verholpen in GitLab Enterprise Edition en Community Edition | 2024-06-27T13:09:06.950898Z | 2024-07-04T06:45:26.935999Z |
| ncsc-2024-0274 | Kwetsbaarheid verholpen in GeoServer | 2024-07-02T11:40:34.048090Z | 2024-07-05T09:41:10.197056Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-542525 | SSA-542525: Authentication Vulnerabilities in SIMATIC HMI Products | 2020-09-08T00:00:00Z | 2021-06-08T00:00:00Z |
| ssa-574442 | SSA-574442: Multiple PAR and DFT File Parsing Vulnerabilities in Solid Edge | 2021-04-13T00:00:00Z | 2021-06-08T00:00:00Z |
| ssa-645530 | SSA-645530: TIFF File Parsing Vulnerability in JT2Go and Teamcenter Visualization before V13.1.0.3 | 2021-06-08T00:00:00Z | 2021-06-08T00:00:00Z |
| ssa-173615 | SSA-173615: Multiple PAR and ASM File Parsing Vulnerabilities in Solid Edge | 2021-07-13T00:00:00Z | 2021-07-13T00:00:00Z |
| ssa-203306 | SSA-203306: Password Vulnerabilities in SIPROTEC 4 and SIPROTEC Compact Relay Families | 2018-03-08T00:00:00Z | 2021-07-13T00:00:00Z |
| ssa-209268 | SSA-209268: Multiple JT File Parsing Vulnerabilities in JT Utilities before V13.0.2.0 | 2021-07-13T00:00:00Z | 2021-07-13T00:00:00Z |
| ssa-352521 | SSA-352521: Access Check Bypass Vulnerability in Mendix | 2021-07-13T00:00:00Z | 2021-07-13T00:00:00Z |
| ssa-448291 | SSA-448291: Denial-of-Service Vulnerability in ARP Protocol of RWG Universal Controllers | 2021-07-13T00:00:00Z | 2021-07-13T00:00:00Z |
| ssa-483182 | SSA-483182: Multiple File Parsing Vulnerabilities in JT2Go and Teamcenter Visualization before V13.2 | 2021-07-13T00:00:00Z | 2021-07-13T00:00:00Z |
| ssa-622535 | SSA-622535: Multiple Vulnerabilities in Teamcenter Active Workspace | 2021-07-13T00:00:00Z | 2021-07-13T00:00:00Z |
| ssa-641963 | SSA-641963: Remote Code Execution Vulnerability in Multiple SIMATIC Software Products | 2021-07-13T00:00:00Z | 2021-07-13T00:00:00Z |
| ssa-729965 | SSA-729965: TLS Certificate Validation Vulnerability in SINUMERIK Integrate Operate Client | 2021-07-13T00:00:00Z | 2021-07-13T00:00:00Z |
| ssa-158827 | SSA-158827: Denial-of-Service Vulnerability in Automation License Manager | 2021-08-10T00:00:00Z | 2021-08-10T00:00:00Z |
| ssa-286838 | SSA-286838: Multiple Vulnerabilities in SINAMICS Medium Voltage Products | 2021-05-11T00:00:00Z | 2021-08-10T00:00:00Z |
| ssa-365397 | SSA-365397: Multiple File Parsing Vulnerabilities in JT2Go and Teamcenter Visualization before V13.2.0.1 | 2021-08-10T00:00:00Z | 2021-08-10T00:00:00Z |
| ssa-553445 | SSA-553445: DNS "Name:Wreck" Vulnerabilities in Multiple Siemens Energy AGT and SGT solutions | 2021-08-10T00:00:00Z | 2021-08-10T00:00:00Z |
| ssa-752103 | SSA-752103: Telnet Authentication Vulnerability in SINAMICS Medium Voltage Products | 2021-05-11T00:00:00Z | 2021-08-10T00:00:00Z |
| ssa-818688 | SSA-818688: Multiple Vulnerabilities in Solid Edge before SE2021MP7 | 2021-08-10T00:00:00Z | 2021-08-10T00:00:00Z |
| ssa-816035 | SSA-816035: Code Execution Vulnerability in SINEMA Remote Connect Client | 2021-08-19T00:00:00Z | 2021-08-19T00:00:00Z |
| ssa-109294 | SSA-109294: Scene File Parsing Vulnerability in Simcenter STAR-CCM+ Viewer | 2021-09-14T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-139628 | SSA-139628: Vulnerabilities in Web Server for Scalance X Products | 2021-01-12T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-187092 | SSA-187092: Several Buffer-Overflow Vulnerabilities in Web Server of SCALANCE X-200 | 2021-04-13T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-208530 | SSA-208530: File parsing vulnerabilities in IFC adapter in NX | 2021-09-14T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-288459 | SSA-288459: Heap Overflow Vulnerability in RFID terminals | 2021-09-14T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-330339 | SSA-330339: Web Vulnerabilities in SINEC NMS | 2021-09-14T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-334944 | SSA-334944: Vulnerability in SINEMA Remote Connect Server | 2021-09-14T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-413407 | SSA-413407: Path Traversal Vulnerability in Teamcenter Active Workspace | 2021-09-14T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-428051 | SSA-428051: Privilege Escalation Vulnerability in TIA Administrator | 2021-02-09T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-434534 | SSA-434534: Memory Protection Bypass Vulnerability in SIMATIC S7-1200 and S7-1500 CPU Families | 2021-05-28T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-434535 | SSA-434535: Memory Protection Bypass Vulnerability in SINAMICS PERFECT HARMONY GH180 Drives | 2021-07-13T00:00:00Z | 2021-09-14T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2005:627 | Red Hat Security Advisory: gaim security update | 2005-08-10T03:54:00Z | 2005-08-09T00:00:00Z |
| rhsa-2005_627 | Red Hat Security Advisory: gaim security update | 2005-08-10T03:54:00Z | 2005-08-09T00:00:00Z |
| rhsa-2005:769 | Red Hat Security Advisory: mozilla security update | 2005-09-10T01:32:00Z | 2005-09-09T00:00:00Z |
| rhsa-2005_769 | Red Hat Security Advisory: mozilla security update | 2005-09-10T01:32:00Z | 2005-09-09T00:00:00Z |
| rhsa-2006:0199 | Red Hat Security Advisory: mozilla security update | 2006-02-02T15:38:00Z | 2006-02-02T00:00:00Z |
| rhsa-2006_0199 | Red Hat Security Advisory: mozilla security update | 2006-02-02T15:38:00Z | 2006-02-02T00:00:00Z |
| rhsa-2011:0439 | Red Hat Security Advisory: rhev-hypervisor security and bug fix update | 2011-04-13T14:55:00Z | 2011-04-13T11:00:00Z |
| rhsa-2011_0439 | Red Hat Security Advisory: rhev-hypervisor security and bug fix update | 2011-04-13T14:55:00Z | 2011-04-13T11:00:00Z |
| rhsa-2011:1090 | Red Hat Security Advisory: rhev-hypervisor security and bug fix update | 2011-07-27T14:40:00Z | 2011-07-27T10:40:00Z |
| rhsa-2011_1090 | Red Hat Security Advisory: rhev-hypervisor security and bug fix update | 2011-07-27T14:40:00Z | 2011-07-27T10:40:00Z |
| rhsa-2011:1408 | Red Hat Security Advisory: rhev-hypervisor security update | 2011-10-26T15:28:00Z | 2011-10-26T11:32:00Z |
| rhsa-2011_1408 | Red Hat Security Advisory: rhev-hypervisor security update | 2011-10-26T15:28:00Z | 2011-10-26T11:32:00Z |
| rhsa-2012:0168 | Red Hat Security Advisory: rhev-hypervisor5 security and bug fix update | 2012-02-21T04:52:00Z | 2012-02-21T05:01:00Z |
| rhsa-2012_0168 | Red Hat Security Advisory: rhev-hypervisor5 security and bug fix update | 2012-02-21T04:52:00Z | 2012-02-21T05:01:00Z |
| rhsa-2012:1185 | Red Hat Security Advisory: rhev-hypervisor5 security and bug fix update | 2012-08-21T19:09:00Z | 2012-08-21T19:12:00Z |
| rhsa-2012_1185 | Red Hat Security Advisory: rhev-hypervisor5 security and bug fix update | 2012-08-21T19:09:00Z | 2012-08-21T19:12:00Z |
| rhsa-2012:1262 | Red Hat Security Advisory: rhev-hypervisor5 security and bug fix update | 2012-09-13T16:48:00Z | 2012-09-13T16:48:00Z |
| rhsa-2012_1262 | Red Hat Security Advisory: rhev-hypervisor5 security and bug fix update | 2012-09-13T16:48:00Z | 2012-09-13T16:48:00Z |
| rhsa-2012:1324 | Red Hat Security Advisory: rhev-hypervisor5 security and bug fix update | 2012-10-02T17:01:00Z | 2012-10-02T17:10:00Z |
| rhsa-2012_1324 | Red Hat Security Advisory: rhev-hypervisor5 security and bug fix update | 2012-10-02T17:01:00Z | 2012-10-02T17:10:00Z |
| rhsa-2010:0451 | Red Hat Security Advisory: Red Hat Certificate System 7.1 - End of Life Notice | 2010-06-03T07:32:00+00:00 | 2024-04-27T14:16:01+00:00 |
| rhsa-2010_0451 | Red Hat Security Advisory: Red Hat Certificate System 7.1 - End of Life Notice | 2010-06-03T07:32:00+00:00 | 2024-04-27T14:16:01+00:00 |
| rhsa-2010:0452 | Red Hat Security Advisory: Red Hat Directory Server 7.1 - End of Life Notice | 2010-06-03T07:33:00+00:00 | 2024-04-27T14:16:12+00:00 |
| rhsa-2010_0452 | Red Hat Security Advisory: Red Hat Directory Server 7.1 - End of Life Notice | 2010-06-03T07:33:00+00:00 | 2024-04-27T14:16:12+00:00 |
| rhsa-2018_0011 | Red Hat Security Advisory: kernel security update | 2018-01-04T00:17:48+00:00 | 2024-04-27T18:02:24+00:00 |
| rhsa-2020_1344 | Red Hat Security Advisory: virt:rhel security update | 2020-04-07T07:42:56+00:00 | 2024-04-27T20:04:56+00:00 |
| rhsa-2020_2472 | Red Hat Security Advisory: virt:rhel security update | 2020-06-10T10:39:14+00:00 | 2024-04-27T20:11:56+00:00 |
| rhsa-2020_3040 | Red Hat Security Advisory: virt:rhel security update | 2020-07-21T14:35:23+00:00 | 2024-04-27T20:29:10+00:00 |
| rhsa-2020_4058 | Red Hat Security Advisory: virt:rhel security update | 2020-09-29T08:27:21+00:00 | 2024-04-27T20:58:49+00:00 |
| rhsa-2014:1905 | Red Hat Security Advisory: Red Hat OpenShift Enterprise 1.2 - Final Retirement Notice | 2014-11-25T18:19:19+00:00 | 2024-05-02T15:00:13+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-17-087-02 | 3S-Smart Software Solutions GmbH CODESYS Web Server | 2017-03-28T00:00:00.000000Z | 2017-03-28T00:00:00.000000Z |
| icsa-17-089-01 | Schneider Electric Wonderware InTouch Access Anywhere | 2017-03-30T00:00:00.000000Z | 2017-03-30T00:00:00.000000Z |
| icsa-17-089-02 | Schneider Electric Modicon PLCs | 2017-03-30T00:00:00.000000Z | 2017-03-30T00:00:00.000000Z |
| icsa-17-094-01 | Schneider Electric Interactive Graphical SCADA System Software | 2017-04-04T00:00:00.000000Z | 2017-04-04T00:00:00.000000Z |
| icsa-17-094-03 | Rockwell Automation Allen-Bradley Stratix and Allen-Bradley ArmorStratix | 2017-04-04T00:00:00.000000Z | 2017-04-04T00:00:00.000000Z |
| icsa-17-101-01 | Schneider Electric Modicon Modbus Protocol | 2017-04-11T00:00:00.000000Z | 2017-04-11T00:00:00.000000Z |
| icsa-17-019-01a | Schneider Electric homeLYnk Controller (Update A) | 2017-01-19T00:00:00.000000Z | 2017-04-13T00:00:00.000000Z |
| icsa-17-103-01 | Wecon Technologies LEVI Studio HMI Editor | 2017-04-13T00:00:00.000000Z | 2017-04-13T00:00:00.000000Z |
| icsa-17-026-02a | Belden Hirschmann GECKO (Update A) | 2017-01-26T00:00:00.000000Z | 2017-04-18T00:00:00.000000Z |
| icsa-17-115-01 | BLF-Tech LLC VisualView HMI | 2017-04-25T00:00:00.000000Z | 2017-04-25T00:00:00.000000Z |
| icsa-17-115-02 | Sierra Wireless AirLink Raven XE and XT | 2017-04-25T00:00:00.000000Z | 2017-04-25T00:00:00.000000Z |
| icsa-17-115-03 | Hyundai Motor America Blue Link | 2017-04-25T00:00:00.000000Z | 2017-04-25T00:00:00.000000Z |
| icsa-17-096-01a | Certec EDV GmbH atvise scada (Update A) | 2017-04-06T00:00:00.000000Z | 2017-04-27T00:00:00.000000Z |
| icsa-17-122-01 | Schneider Electric Wonderware Historian Client | 2017-05-02T00:00:00.000000Z | 2017-05-02T00:00:00.000000Z |
| icsa-17-122-02 | CyberVision Kaa IoT Platform | 2017-05-02T00:00:00.000000Z | 2017-05-02T00:00:00.000000Z |
| icsa-17-122-03 | Advantech B+B SmartWorx MESR901 | 2017-05-02T00:00:00.000000Z | 2017-05-02T00:00:00.000000Z |
| icsa-17-094-05 | Rockwell Automation ControlLogix 5580 and CompactLogix 5380 | 2017-04-04T00:00:00.000000Z | 2017-05-04T00:00:00.000000Z |
| icsa-17-124-01 | Hikvision Cameras | 2017-05-04T00:00:00.000000Z | 2017-05-04T00:00:00.000000Z |
| icsa-17-124-02 | Dahua Technology Co., Ltd Digital Video Recorders and IP Cameras | 2017-05-04T00:00:00.000000Z | 2017-05-04T00:00:00.000000Z |
| icsa-17-124-03 | Advantech WebAccess | 2017-05-04T00:00:00.000000Z | 2017-05-04T00:00:00.000000Z |
| icsa-17-129-03 | Siemens SIMATIC WinCC and SIMATIC WinCC Runtime Professional | 2017-05-09T00:00:00.000000Z | 2017-05-09T00:00:00.000000Z |
| icsa-17-131-01 | PHOENIX CONTACT mGuard | 2017-05-11T00:00:00.000000Z | 2017-05-11T00:00:00.000000Z |
| icsa-17-131-02 | Satel Iberia SenNet Data Logger and Electricity Meters | 2017-05-11T00:00:00.000000Z | 2017-05-11T00:00:00.000000Z |
| icsa-17-136-01 | Detcon SiteWatch Gateway | 2017-05-16T00:00:00.000000Z | 2017-05-16T00:00:00.000000Z |
| icsa-17-136-02 | Schneider Electric SoMachine HVAC | 2017-05-16T00:00:00.000000Z | 2017-05-16T00:00:00.000000Z |
| icsa-17-136-03 | Hanwha Techwin SRN-4000 | 2017-05-16T00:00:00.000000Z | 2017-05-16T00:00:00.000000Z |
| icsa-17-136-04 | Schneider Electric VAMPSET | 2017-05-16T00:00:00.000000Z | 2017-05-16T00:00:00.000000Z |
| icsa-17-138-01 | ICSA-17-138-01_Miele Professional PG 85 Series | 2017-05-18T00:00:00.000000Z | 2017-05-18T00:00:00.000000Z |
| icsa-17-138-02 | Schneider Electric Wonderware InduSoft Web Studio | 2017-05-18T00:00:00.000000Z | 2017-05-18T00:00:00.000000Z |
| icsa-17-115-04 | Rockwell Automation Allen-Bradley MicroLogix 1100 and 1400 | 2017-04-25T00:00:00.000000Z | 2017-05-23T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-20171129-nxos1 | Cisco NX-OS System Software Patch Installation Arbitrary File Write Vulnerability | 2017-11-29T16:00:00+00:00 | 2017-11-29T16:00:00+00:00 |
| cisco-sa-20171129-nxos2 | Cisco NX-OS System Software Image Signature Bypass Vulnerability | 2017-11-29T16:00:00+00:00 | 2017-11-29T16:00:00+00:00 |
| cisco-sa-20180103-warfp | Cisco WebEx Advanced Recording Format Player Remote Code Execution Vulnerability | 2018-01-03T16:00:00+00:00 | 2018-01-03T16:00:00+00:00 |
| cisco-sa-20180103-wnrp | Cisco WebEx Network Recording Player Buffer Overflow Vulnerability | 2018-01-03T16:00:00+00:00 | 2018-01-03T16:00:00+00:00 |
| cisco-sa-20180110-ucm | Cisco Unified Communications Manager Cross-Site Scripting Vulnerability | 2018-01-10T16:00:00+00:00 | 2018-01-10T16:00:00+00:00 |
| cisco-sa-20171129-fxnx | Cisco FXOS and NX-OS System Software CLI Command Injection Vulnerability | 2017-11-29T16:00:00+00:00 | 2018-01-11T18:32:00+00:00 |
| cisco-sa-20171129-nss | Cisco Nexus Series Switches CLI Command Injection Vulnerability | 2017-11-29T16:00:00+00:00 | 2018-01-11T18:32:00+00:00 |
| cisco-sa-20180117-300-500-smb1 | Cisco Small Business 300 and 500 Series Managed Switches Cross-Site Scripting Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-300-500-smb2 | Cisco Small Business 300 and 500 Series Managed Switches HTTP Response Splitting Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-acpe | Cisco AnyConnect Profile Editor XML External Entity Injection Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-cpi | Cisco Prime Infrastructure Privilege Escalation Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-cps | Cisco Policy Suite Unauthenticated Information Disclosure Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-esc | Cisco Elastic Services Controller Information Disclosure Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-iess | Cisco IOS Software for Industrial Ethernet 4010 Series Switches Test Command Arbitrary Code Execution and Denial of Service Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-ise | Cisco Identity Services Engine DOM Cross-Site Scripting Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-ntr | Cisco D9800 Network Transport Receiver OS Command Injection Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-nx-os | Cisco NX-OS Software Pong Packet Denial of Service Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-nxos1 | Cisco NX-OS System Software Unauthorized User Account Deletion Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-prime-infrastructure | Cisco Prime Infrastructure Open Redirect Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-psc | Cisco Prime Service Catalog Cross-Site Request Forgery Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-staros | Cisco StarOS CLI Command Injection Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-ucs | Cisco UCS Central Software IPv6 Denial of Service Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-wap | Cisco WAP150 Wireless Cross-Site Scripting Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-wms | Cisco WebEx Meetings Server Information Disclosure Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-wms1 | Cisco WebEx Meetings Server Information Disclosure Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-wms2 | Cisco WebEx Meetings Server Remote Account Disabling Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-wms3 | Cisco WebEx Meetings Server Information Disclosure Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-wsa1 | Cisco Web Security Appliance Reflected Cross-Site Scripting Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-nxos | Cisco NX-OS System Software Management Interface Denial of Service Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-19T21:29:00+00:00 |
| cisco-sa-20180117-esasma | Cisco Email Security and Content Security Management Appliance Privilege Escalation Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-23T16:28:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| SCA-2023-0004 | Vulnerabilities in SICK FTMg | 2023-05-11T13:00:00.000Z | 2023-05-11T13:00:00.000Z |
| sca-2023-0004 | Vulnerabilities in SICK FTMg | 2023-05-11T13:00:00.000Z | 2023-05-11T13:00:00.000Z |
| SCA-2023-0005 | Vulnerabilities in SICK EventCam App | 2023-06-19T11:00:00.000Z | 2023-06-19T11:00:00.000Z |
| sca-2023-0005 | Vulnerabilities in SICK EventCam App | 2023-06-19T11:00:00.000Z | 2023-06-19T11:00:00.000Z |
| SCA-2023-0006 | Vulnerabilities in SICK ICR890-4 | 2023-07-10T13:00:00.000Z | 2023-07-10T13:00:00.000Z |
| sca-2023-0006 | Vulnerabilities in SICK ICR890-4 | 2023-07-10T13:00:00.000Z | 2023-07-10T13:00:00.000Z |
| SCA-2023-0007 | Vulnerabilities in SICK LMS5xx | 2023-08-25T11:00:00.000Z | 2023-08-25T11:00:00.000Z |
| sca-2023-0007 | Vulnerabilities in SICK LMS5xx | 2023-08-25T11:00:00.000Z | 2023-08-25T11:00:00.000Z |
| SCA-2023-0009 | Vulnerability in Wibu-Systems CodeMeter Runtime affects multiple SICK products | 2023-09-29T10:00:00.000Z | 2023-09-29T10:00:00.000Z |
| sca-2023-0009 | Vulnerability in Wibu-Systems CodeMeter Runtime affects multiple SICK products | 2023-09-29T10:00:00.000Z | 2023-09-29T10:00:00.000Z |
| SCA-2023-0008 | Vulnerability in SICK SIM1012 | 2023-09-29T13:00:00.000Z | 2023-09-29T13:00:00.000Z |
| sca-2023-0008 | Vulnerability in SICK SIM1012 | 2023-09-29T13:00:00.000Z | 2023-09-29T13:00:00.000Z |
| SCA-2023-0010 | Vulnerabilities in SICK Application Processing Unit | 2023-10-09T11:00:00.000Z | 2023-10-09T11:00:00.000Z |
| sca-2023-0010 | Vulnerabilities in SICK Application Processing Unit | 2023-10-09T11:00:00.000Z | 2023-10-09T11:00:00.000Z |
| SCA-2023-0011 | Vulnerability in multiple SICK Flexi Soft Gateways | 2023-10-23T11:00:00.000Z | 2023-10-23T11:00:00.000Z |
| sca-2023-0011 | Vulnerability in multiple SICK Flexi Soft Gateways | 2023-10-23T11:00:00.000Z | 2023-10-23T11:00:00.000Z |
| sca-2024-0001 | Vulnerability in SICK Logistics Analytics Products and SICK Field Analytics | 2024-01-29T00:00:00.000Z | 2024-01-29T00:00:00.000Z |
| sca-2024-0002 | Vulnerability in SICK MSC800 | 2024-09-11T23:00:00.000Z | 2024-09-11T23:00:00.000Z |
| sca-2024-0003 | Critical vulnerability in multiple SICK products | 2024-10-17T13:00:00.000Z | 2024-10-17T13:00:00.000Z |
| sca-2024-0004 | Third party vulnerabilities in SICK CDE-100 | 2024-11-07T12:00:00.000Z | 2024-11-07T12:00:00.000Z |
| sca-2024-0005 | Vulnerability in SICK Incoming Goods Suite | 2024-11-19T00:00:00.000Z | 2024-11-19T00:00:00.000Z |
| sca-2024-0006 | Critical vulnerabilities in SICK InspectorP61x, InspectorP62x and TiM3xx | 2024-12-06T00:00:00.000Z | 2024-12-06T00:00:00.000Z |
| sca-2024-0007 | Vulnerability in SICK OLM | 2024-12-31T00:00:00.000Z | 2024-12-31T00:00:00.000Z |
| sca-2025-0002 | Vulnerability in SICK Lector8xx and SICK InspectorP8xx | 2025-02-14T10:19:00.000Z | 2025-02-14T10:19:00.000Z |
| sca-2025-0001 | Multiple vulnerabilities in SICK MEAC300 | 2025-02-14T14:00:00.000Z | 2025-02-21T14:00:00.000Z |
| sca-2025-0004 | Critical vulnerabilities in SICK DL100-2xxxxxxx | 2025-03-14T11:00:00.000Z | 2025-03-14T11:00:00.000Z |
| sca-2025-0005 | Vulnerabilities in SICK Flexi Compact | 2025-04-28T10:00:00.000Z | 2025-04-28T10:00:00.000Z |
| sca-2025-0006 | Vulnerability affecting picoScan and multiScan | 2025-04-28T13:00:00.000Z | 2025-04-28T13:00:00.000Z |
| sca-2025-0003 | FreeRTOS Vulnerabilities have no impact on SICK Products | 2025-02-28T00:00:00.000Z | 2025-05-20T11:00:00.000Z |
| sca-2025-0007 | Multiple vulnerabilities in SICK Field Analytics and SICK Media Server | 2025-06-12T13:00:00.000Z | 2025-06-12T13:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| nn-2023_2-01 | Authenticated Blind SQL Injection on sorting in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023_3-01 | Authenticated Blind SQL Injection on alerts count in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023_4-01 | Stored Cross-Site Scripting (XSS) in Threat Intelligence rules in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023_5-01 | Information disclosure via the debug function in assertions in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023_6-01 | Partial DoS on Reports section due to null report name in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023_7-01 | DoS via SAML configuration in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023_8-01 | Session Fixation in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023_9-01 | Authenticated SQL Injection on Query functionality in Guardian/CMC before 22.6.3 and 23.1.0 | 2023-09-18T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:12-01 | Check Point IoT integration: WebSocket returns assets data without authentication in Guardian/CMC before 23.3.0 | 2024-01-15T11:00:00.000Z | 2024-01-16T11:00:00.000Z |
| nn-2023_12-01 | Check Point IoT integration: WebSocket returns assets data without authentication in Guardian/CMC before 23.3.0 | 2024-01-15T11:00:00.000Z | 2024-01-16T11:00:00.000Z |
| nn-2024:1-01 | DoS on IDS parsing of malformed Radius packets in Guardian before 23.4.1 | 2024-04-10T11:00:00.000Z | 2024-04-10T11:00:00.000Z |
| nn-2024_1-01 | DoS on IDS parsing of malformed Radius packets in Guardian before 23.4.1 | 2024-04-10T11:00:00.000Z | 2024-04-10T11:00:00.000Z |
| nn-2023:17-01 | Information disclosure via audit records for OpenAPI requests in Guardian/CMC before 23.4.1 | 2024-04-10T11:00:00.000Z | 2024-04-11T11:00:00.000Z |
| nn-2023_17-01 | Information disclosure via audit records for OpenAPI requests in Guardian/CMC before 23.4.1 | 2024-04-10T11:00:00.000Z | 2024-04-11T11:00:00.000Z |
| nn-2025:1-01 | Authenticated RCE in update functionality in Guardian/CMC before 24.6.0 | 2025-06-10T11:00:00.000Z | 2025-06-10T11:00:00.000Z |
| nn-2025:2-01 | Privilege escalation in Guardian/CMC before 24.6.0 | 2025-06-10T11:00:00.000Z | 2025-06-10T11:00:00.000Z |
| nn-2025:3-01 | Incorrect authorization for traces request/download in CMC before 25.1.0 | 2025-08-26T11:00:00.000Z | 2025-08-26T11:00:00.000Z |
| nn-2025:10-01 | Authenticated SQL Injection on CLI functionality in Guardian/CMC before 25.3.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:4-01 | Client-side path traversal in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:5-01 | Incorrect authorization for CLI in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:6-01 | Authenticated SQL Injection on Smart Polling functionality in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:7-01 | Authenticated SQL Injection on Alert functionality in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:8-01 | Authenticated SQL Injection on Alert functionality in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:9-01 | Path traversal in Time Machine functionality in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:11-01 | Stored Cross-Site Scripting (XSS) in Dashboards in Guardian/CMC before 25.4.0 | 2025-11-25T11:00:00.000Z | 2025-11-26T11:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2019-20838 | libpcre in PCRE before 8.43 allows a subject buffer over-read in JIT when UTF is disabled and \X or \R has more than one fixed quantifier a related issue to CVE-2019-20454. | 2020-06-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-20892 | net-snmp before 5.8.1.pre1 has a double free in usm_free_usmStateReference in snmplib/snmpusm.c via an SNMPv3 GetBulk request. NOTE: this affects net-snmp packages shipped to end users by multiple Linux distributions but might not affect an upstream release. | 2020-06-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-3842 | In systemd before v242-rc4 it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker in some particular configurations to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the "allow_active" element rather than "allow_any". | 2019-04-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-3843 | It was discovered that a systemd service that uses DynamicUser property can create a SUID/SGID binary that would be allowed to run as the transient service UID/GID even after the service is terminated. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future when the UID/GID will be recycled. | 2019-04-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-3844 | It was discovered that a systemd service that uses DynamicUser property can get new privileges through the execution of SUID binaries which would allow to create binaries owned by the service transient group with the setgid bit set. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future when the GID will be recycled. | 2019-04-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-6454 | An issue was discovered in sd-bus in systemd 239. bus_process_object() in libsystemd/sd-bus/bus-objects.c allocates a variable-length stack buffer for temporarily storing the object path of incoming D-Bus messages. An unprivileged local user can exploit this by sending a specially crafted message to PID1 causing the stack pointer to jump over the stack guard pages into an unmapped memory region and trigger a denial of service (systemd PID1 crash and kernel panic). | 2019-03-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-6461 | An issue was discovered in cairo 1.16.0. There is an assertion problem in the function _cairo_arc_in_direction in the file cairo-arc.c. | 2019-01-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-6462 | An issue was discovered in cairo 1.16.0. There is an infinite loop in the function _arc_error_normalized in the file cairo-arc.c related to _arc_max_angle_for_tolerance_normalized. | 2019-01-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-7309 | In the GNU C Library (aka glibc or libc6) through 2.29 the memcmp function for the x32 architecture can incorrectly return zero (indicating that the inputs are equal) because the RDX most significant bit is mishandled. | 2019-02-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-9071 | An issue was discovered in GNU libiberty as distributed in GNU Binutils 2.32. It is a stack consumption issue in d_count_templates_scopes in cp-demangle.c after many recursive calls. | 2019-02-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-9072 | An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd) as distributed in GNU Binutils 2.32. It is an attempted excessive memory allocation in setup_group in elf.c. | 2019-02-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-9073 | An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd) as distributed in GNU Binutils 2.32. It is an attempted excessive memory allocation in _bfd_elf_slurp_version_tables in elf.c. | 2019-02-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-9074 | An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd) as distributed in GNU Binutils 2.32. It is an out-of-bounds read leading to a SEGV in bfd_getl32 in libbfd.c when called from pex64_get_runtime_function in pei-x86_64.c. | 2019-02-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-9075 | An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd) as distributed in GNU Binutils 2.32. It is a heap-based buffer overflow in _bfd_archive_64_bit_slurp_armap in archive64.c. | 2019-02-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-9076 | An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd) as distributed in GNU Binutils 2.32. It is an attempted excessive memory allocation in elf_read_notes in elf.c. | 2019-02-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-9077 | An issue was discovered in GNU Binutils 2.32. It is a heap-based buffer overflow in process_mips_specific in readelf.c via a malformed MIPS option section. | 2019-02-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-9169 | In the GNU C Library (aka glibc or libc6) through 2.29 proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match. | 2019-02-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-10029 | The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern a seen when passing a 0x5d414141414141410000 value to sinl on x86 targets. This is related to sysdeps/ieee754/ldbl-96/e_rem_pio2l.c. | 2020-03-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-10702 | A flaw was found in QEMU in the implementation of the Pointer Authentication (PAuth) support for ARM introduced in version 4.0 and fixed in version 5.0.0. A general failure of the signature generation process caused every PAuth-enforced pointer to be signed with the same signature. A local attacker could obtain the signature of a protected pointer and abuse this flaw to bypass PAuth protection for all programs running on QEMU. | 2020-06-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-10744 | An incomplete fix was found for the fix of the flaw CVE-2020-1733 ansible: insecure temporary directory when running become_user from become directive. The provided fix is insufficient to prevent the race condition on systems using ACLs and FUSE filesystems. Ansible Engine 2.7.18 2.8.12 and 2.9.9 as well as previous versions are affected and Ansible Tower 3.4.5 3.5.6 and 3.6.4 as well as previous versions are affected. | 2020-05-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-10761 | An assertion failure issue was found in the Network Block Device(NBD) Server in all QEMU versions before QEMU 5.0.1. This flaw occurs when an nbd-client sends a spec-compliant request that is near the boundary of maximum permitted request length. A remote nbd-client could use this flaw to crash the qemu-nbd server resulting in a denial of service. | 2020-06-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-11080 | Denial of service in nghttp2 | 2020-06-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-11102 | hw/net/tulip.c in QEMU 4.2.0 has a buffer overflow during the copying of tx/rx buffers because the frame size is not validated against the r/w data length. | 2020-04-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-11494 | An issue was discovered in slc_bump in drivers/net/can/slcan.c in the Linux kernel 3.16 through 5.6.2. It allows attackers to read uninitialized can_frame data potentially containing sensitive information from kernel stack memory if the configuration lacks CONFIG_INIT_STACK_ALL aka CID-b9258a2cece4. | 2020-04-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-11565 | An issue was discovered in the Linux kernel through 5.6.2. mpol_parse_str in mm/mempolicy.c has a stack-based out-of-bounds write because an empty nodelist is mishandled during mount option parsing aka CID-aa9f7d5172fa. NOTE: Someone in the security community disagrees that this is a vulnerability because the issue “is a bug in parsing mount options which can only be specified by a privileged user so triggering the bug does not grant any powers not already held.” | 2020-04-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-11725 | snd_ctl_elem_add in sound/core/control.c in the Linux kernel through 5.6.3 has a count=info->owner line which later affects a private_size*count multiplication for unspecified "interesting side effects." NOTE: kernel engineers dispute this finding because it could be relevant only if new callers were added that were unfamiliar with the misuse of the info->owner field to represent data unrelated to the "owner" concept. The existing callers SNDRV_CTL_IOCTL_ELEM_ADD and SNDRV_CTL_IOCTL_ELEM_REPLACE have been designed to misuse the info->owner field in a safe way | 2020-04-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-11869 | An integer overflow was found in QEMU 4.0.1 through 4.2.0 in the way it implemented ATI VGA emulation. This flaw occurs in the ati_2d_blt() routine in hw/display/ati-2d.c while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could abuse this flaw to crash the QEMU process resulting in a denial of service. | 2020-04-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-11984 | Apache HTTP server 2.4.32 to 2.4.44 mod_proxy_uwsgi info disclosure and possible RCE | 2020-08-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-11993 | Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns logging statements were made on the wrong connection causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers. | 2020-08-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-12655 | An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata aka CID-d0c7feaf8767. | 2020-05-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| 3kxg200000r4801 | CoreSense™ HM and CoreSense™ M10 File Path Traversal Vulnerability | 2025-04-16T00:30:00.000Z | 2025-10-20T00:30:00.000Z |
| 9akk108471a8948 | Terra AC wallbox Heap Memory Corruption Vulnerability | 2025-10-20T00:30:00.000Z | 2025-10-21T00:30:00.000Z |
| 4tz00000006007 | ALS-mini-S4/S8 IP Missing Authentication Vulnerability and its Mitigations | 2025-10-20T00:30:00.000Z | 2025-10-23T00:30:00.000Z |
| 2nga002813 | PCM600 SharpZip library vulnerability | 2025-11-03T00:30:00.000Z | 2025-11-03T00:30:00.000Z |
| 7paa022088 | Edgenius Management Portal Authentication Bypass | 2025-11-20T00:30:00.000Z | 2025-11-20T00:30:00.000Z |
| 4hzm000603 | ABB Ability Camera Connect Vulnerabilities in outdated 3rd party component (VLC) | 2025-11-27T00:30:00.000Z | 2025-11-28T00:30:00.000Z |
| 9akk108471a8107 | Terra AC wallbox Heap Memory Corruption Vulnerability | 2025-09-16T00:30:00.000Z | 2025-11-28T08:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-201005-0064 | Cisco Mediator Framework 1.5.1 before 1.5.1.build.14-eng, 2.2 before 2.2.1.dev.1, and 3.0… | 2021-12-18T17:28:24.032000Z |
| var-200412-0263 | The DSS verification code in Dropbear SSH Server before 0.43 frees uninitialized variable… | 2021-12-18T17:51:52.131000Z |
| var-201001-0029 | Unspecified vulnerability in PowerDNS Recursor before 3.1.7.2 allows remote attackers to … | 2021-12-18T17:56:06.278000Z |
| var-201001-0163 | The ipv6_hop_jumbo function in net/ipv6/exthdrs.c in the Linux kernel before 2.6.32.4, wh… | 2021-12-18T21:59:59.281000Z |
| var-201805-0613 | procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a … | 2021-12-18T22:07:19.455000Z |
| var-201004-0267 | The virtual networking stack in VMware Workstation 7.0 before 7.0.1 build 227600, VMware … | 2021-12-18T23:56:55.293000Z |
| var-201804-1619 | Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Install). Support… | 2021-12-19T00:57:05.378000Z |
| var-202104-2088 | 2022-01-01T21:43:54.006000Z | |
| var-201012-0429 | 2022-01-17T14:43:53.884000Z | |
| var-201008-0396 | 2022-01-17T15:13:57.932000Z | |
| var-201005-0441 | 2022-01-17T15:35:01.886000Z | |
| var-201005-0440 | 2022-01-17T15:35:03.822000Z | |
| var-201312-0004 | Xen in the Linux kernel, when running a guest on a host without hardware assisted paging … | 2022-03-28T12:59:37.660000Z |
| var-202101-1992 | 2022-03-28T13:10:14.160000Z | |
| var-202012-1590 | 2022-03-28T13:10:48.663000Z | |
| var-202011-1582 | 2022-03-28T13:11:18.983000Z | |
| var-201302-0422 | 2022-03-28T13:18:10.496000Z | |
| var-201712-0384 | 2022-03-28T13:39:01.352000Z | |
| var-201204-0234 | 2022-03-28T14:09:38.006000Z | |
| var-202110-1907 | 2022-03-28T15:24:27.396000Z | |
| var-202109-1968 | 2022-03-28T15:24:42.425000Z | |
| var-202103-1651 | 2022-03-28T15:26:17.893000Z | |
| var-202103-1752 | 2022-03-28T15:26:17.351000Z | |
| var-202101-1994 | 2022-03-28T15:26:59.656000Z | |
| var-202101-2000 | 2022-03-28T15:26:59.562000Z | |
| var-202008-0729 | 2022-03-28T15:28:42.740000Z | |
| var-201109-0401 | 2022-03-28T15:47:17.677000Z | |
| var-202012-1631 | 2022-03-28T16:00:29.378000Z | |
| var-202112-1881 | DIAEnergie Version 1.7.5 and prior is vulnerable to a reflected cross-site scripting atta… | 2022-03-29T07:27:46.293000Z |
| var-202112-1878 | DIAEnergie Version 1.7.5 and prior is vulnerable to multiple cross-site scripting vulnera… | 2022-03-29T07:33:48.880000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2005-000343 | DeleGate DNS Message Decompression Denial of Service Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000396 | Ruby XMLRPC Arbitrary Command Execution Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000530 | Vulnerability in multiple web browsers allowing request spoofing attacks | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000537 | Webmin and Usermin authentication bypass vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000538 | Ruby vulnerability allowing to bypass safe level 4 as a sandbox | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000695 | Ruby XMLRPC Server Denial of Service Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000705 | Fujitsu Java Runtime Environment reflection API vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000706 | Fujitsu Java Runtime Environment reflection API vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000707 | Fujitsu Java Runtime Environment reflection API vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000756 | Tsuru-Kame Mail vulnerable in S/MIME signature verification | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000757 | Cybozu Office browser script execution vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000758 | msearch directory traversal vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000759 | McAfee VirusScan Engine buffer overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000760 | McAfee VirusScan Engine buffer overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000761 | Norton AntiVirus causes abnormal OS termination when a user edits a shared network file | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000762 | Norton AntiVirus causes abnormal OS termination when scanning illegal files | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000763 | ppBlog cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000764 | Website connection problem when a mobile phone terminal uses specific QR code | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000765 | Buffalo router configuration management interface vulnerable to remote access and password leakage | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000766 | w3ml cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000767 | WebUD arbitrary program execution vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000768 | Movable Type session management vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000769 | Virus Security heap overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000770 | Virus Security memory leak vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000771 | Wiki clone cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000772 | Inappropriate interpretation of mailto URL scheme by mail client software | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000773 | desknet's cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000774 | SFS cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000776 | Java Cryptography Extension 1.2.1 (JCE 1.2.1) will no longer function properly after July 28, 2005 due to the expiration of its digital certificate | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000777 | tDiary cross-site request forgery vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| ID | Description | Updated |
|---|---|---|
| ts-2025-004 | TS-2025-004 | 2025-05-27T00:00 |
| ts-2025-005 | TS-2025-005 | 2025-08-07T00:00 |
| ts-2025-006 | TS-2025-006 | 2025-10-28T00:00 |
| ts-2025-007 | TS-2025-007 | 2025-11-07T00:00 |
| ts-2025-008 | TS-2025-008 | 2025-11-19T00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2015:0758-1 | Security update for mutt | 2014-03-17T16:14:56Z | 2014-03-17T16:14:56Z |
| suse-su-2015:0985-1 | Security update for sudo | 2014-03-20T16:16:51Z | 2014-03-20T16:16:51Z |
| suse-ru-2015:0992-1 | Security update for lxc | 2014-04-01T09:58:11Z | 2014-04-01T09:58:11Z |
| suse-su-2015:0841-1 | Recommended update for mono-core | 2014-04-10T23:19:27Z | 2014-04-10T23:19:27Z |
| suse-su-2015:0962-1 | Security update for curl | 2014-04-15T15:50:15Z | 2014-04-15T15:50:15Z |
| suse-su-2015:1227-1 | Security update for strongswan | 2014-05-14T09:26:44Z | 2014-05-14T09:26:44Z |
| suse-su-2015:0674-1 | Security update for xorg-x11-libs | 2014-05-15T16:30:57Z | 2014-05-15T16:30:57Z |
| suse-su-2015:0298-1 | Recommended update for clamav | 2014-05-28T15:49:37Z | 2014-05-28T15:49:37Z |
| suse-su-2015:0871-1 | Recommended update for clamav | 2014-05-28T15:49:37Z | 2014-05-28T15:49:37Z |
| suse-su-2015:0675-1 | Security update for gnutls | 2014-06-03T20:02:07Z | 2014-06-03T20:02:07Z |
| suse-su-2015:0580-1 | Recommended update for util-linux | 2014-06-04T09:10:15Z | 2014-06-04T09:10:15Z |
| suse-su-2015:0886-1 | Security update for struts | 2014-06-20T20:43:07Z | 2014-06-20T20:43:07Z |
| suse-su-2015:0427-1 | Recommended update for xorg-x11-server | 2014-06-27T12:01:01Z | 2014-06-27T12:01:01Z |
| suse-su-2015:1025-1 | Recommended update for xorg-x11-server | 2014-06-27T12:01:01Z | 2014-06-27T12:01:01Z |
| suse-ru-2015:0696-1 | Security update for puppet | 2014-06-30T15:48:55Z | 2014-06-30T15:48:55Z |
| suse-su-2015:1015-1 | Recommended update for dnsmasq | 2014-07-01T23:04:51Z | 2014-07-01T23:04:51Z |
| suse-su-2015:0901-1 | Security update for libtasn1 | 2014-07-17T14:16:08Z | 2014-07-17T14:16:08Z |
| suse-su-2015:0498-1 | Security update for oracle-update | 2014-07-18T09:38:45Z | 2014-07-18T09:38:45Z |
| suse-su-2015:0498-2 | Security update for oracle-update | 2014-07-18T13:49:14Z | 2014-07-18T13:49:14Z |
| suse-su-2015:0907-1 | Security update for oracle-update | 2014-07-18T13:49:14Z | 2014-07-18T13:49:14Z |
| suse-su-2015:0259-3 | Security update for ntp | 2014-07-21T14:05:24Z | 2014-07-21T14:05:24Z |
| suse-su-2015:0575-1 | Security update for CUPS | 2014-07-29T16:37:43Z | 2014-07-29T16:37:43Z |
| suse-su-2015:1011-1 | Security update for CUPS | 2014-07-29T16:37:43Z | 2014-07-29T16:37:43Z |
| suse-su-2015:0620-1 | Security update for MySQL | 2014-08-19T23:56:10Z | 2014-08-19T23:56:10Z |
| suse-su-2015:0946-1 | Security update for MySQL | 2014-08-19T23:56:10Z | 2014-08-19T23:56:10Z |
| suse-su-2015:1177-1 | Security update for MySQL | 2014-08-19T23:56:10Z | 2014-08-19T23:56:10Z |
| suse-su-2015:0709-1 | Security update for subversion | 2014-08-19T23:56:28Z | 2014-08-19T23:56:28Z |
| suse-ru-2015:0591-1 | Recommended update for apache2-mod_nss | 2014-08-22T11:39:07Z | 2014-08-22T11:39:07Z |
| suse-ru-2015:0410-1 | Security update for openstack-dashboard | 2014-08-28T12:06:29Z | 2014-08-28T12:06:29Z |
| suse-ru-2015:0794-1 | Security update for glibc | 2014-08-29T01:15:58Z | 2014-08-29T01:15:58Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2016:2556-1 | Security update for ffmpeg | 2016-10-18T08:52:34Z | 2016-10-18T08:52:34Z |
| opensuse-su-2016:2560-1 | Security update for ffmpeg | 2016-10-18T08:52:34Z | 2016-10-18T08:52:34Z |
| opensuse-su-2016:2597-1 | Security update for Chromium | 2016-10-19T15:50:17Z | 2016-10-19T15:50:17Z |
| opensuse-su-2016:2732-1 | Security update for chromium | 2016-11-04T16:43:12Z | 2016-11-04T16:43:12Z |
| opensuse-su-2016:2733-1 | Security update for chromium | 2016-11-04T16:43:12Z | 2016-11-04T16:43:12Z |
| opensuse-su-2016:3019-1 | Security update for MozillaThunderbird | 2016-12-06T09:05:20Z | 2016-12-06T09:05:20Z |
| opensuse-su-2017:0563-1 | Security update for Chromium | 2016-12-16T22:45:25Z | 2016-12-16T22:45:25Z |
| opensuse-su-2016:3307-1 | Security update for MozillaThunderbird | 2016-12-30T17:01:32Z | 2016-12-30T17:01:32Z |
| opensuse-su-2016:3308-1 | Security update for MozillaThunderbird | 2016-12-30T17:01:32Z | 2016-12-30T17:01:32Z |
| opensuse-su-2017:0034-1 | Security update for kopete | 2017-01-05T13:34:36Z | 2017-01-05T13:34:36Z |
| opensuse-su-2017:0035-1 | Security update for kopete | 2017-01-05T13:34:36Z | 2017-01-05T13:34:36Z |
| opensuse-su-2017:0093-1 | Security update for irssi | 2017-01-09T16:14:54Z | 2017-01-09T16:14:54Z |
| opensuse-su-2017:0094-1 | Security update for irssi | 2017-01-09T16:14:54Z | 2017-01-09T16:14:54Z |
| opensuse-su-2017:0140-1 | Security update for ark | 2017-01-16T14:46:13Z | 2017-01-16T14:46:13Z |
| opensuse-su-2017:0150-1 | Security update for ark | 2017-01-16T14:46:13Z | 2017-01-16T14:46:13Z |
| opensuse-su-2017:0195-1 | Security update for libgit2 | 2017-01-18T13:51:54Z | 2017-01-18T13:51:54Z |
| opensuse-su-2017:0354-1 | Security update for MozillaThunderbird | 2017-02-01T17:54:52Z | 2017-02-01T17:54:52Z |
| opensuse-su-2017:0357-1 | Security update for MozillaThunderbird | 2017-02-01T17:54:52Z | 2017-02-01T17:54:52Z |
| opensuse-su-2017:0361-1 | Security update for nginx | 2017-02-01T21:19:46Z | 2017-02-01T21:19:46Z |
| opensuse-su-2017:0362-1 | Security update for nginx | 2017-02-01T21:19:46Z | 2017-02-01T21:19:46Z |
| opensuse-su-2017:0405-1 | Security update for libgit2 | 2017-02-06T12:58:42Z | 2017-02-06T12:58:42Z |
| opensuse-su-2017:0413-1 | Security update for irssi | 2017-02-07T12:14:55Z | 2017-02-07T12:14:55Z |
| opensuse-su-2017:0565-1 | Security update of chromium | 2017-02-18T10:40:17Z | 2017-02-18T10:40:17Z |
| opensuse-su-2017:0677-1 | Security update for kdelibs4, kio | 2017-03-13T09:55:34Z | 2017-03-13T09:55:34Z |
| opensuse-su-2017:0680-1 | Security update for kdelibs4, kio | 2017-03-13T09:55:34Z | 2017-03-13T09:55:34Z |
| opensuse-su-2017:0687-1 | Security update for MozillaThunderbird | 2017-03-14T14:03:02Z | 2017-03-14T14:03:02Z |
| opensuse-su-2017:0688-1 | Security update for MozillaThunderbird | 2017-03-14T14:03:02Z | 2017-03-14T14:03:02Z |
| opensuse-su-2017:0737-1 | Security update for irssi | 2017-03-17T19:52:10Z | 2017-03-17T19:52:10Z |
| opensuse-su-2017:0739-1 | Security update for irssi | 2017-03-17T19:52:10Z | 2017-03-17T19:52:10Z |
| opensuse-su-2017:0738-1 | Security update for Chromium | 2017-03-17T20:07:47Z | 2017-03-17T20:07:47Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2014-09208 | Ettercap堆缓冲区溢出漏洞 | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09209 | IBM WebSphere Portal XML注入漏洞 | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09210 | IBM Business Process Manager跨站脚本漏洞(CNVD-2014-09210) | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09211 | IBM WebSphere Portal跨站脚本漏洞(CNVD-2014-09211) | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09212 | IBM WebSphere Portal跨站脚本漏洞(CNVD-2014-09212) | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09213 | IBM Rational Quality Manager跨站脚本漏洞(CNVD-2014-09213) | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09214 | WordPress插件SPNbabble存在多个跨站请求伪造漏洞 | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09215 | WordPress插件O2Tweet存在多个跨站请求伪造漏洞 | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09216 | WordPress插件Mikiurl Wordpress Eklentisi存在多个跨站请求伪造漏洞 | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09217 | WordPress插件DandyID Services存在多个跨站请求伪造漏洞 | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09218 | Ricksoft WBS Gantt-Chart add-on跨站脚本漏洞(CNVD-2014-09218) | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09219 | Ricksoft WBS Gantt-Chart add-on跨站脚本漏洞(CNVD-2014-09219) | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09220 | TSUTAYA application任意命令执行漏洞 | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09221 | IBM DB2拒绝服务漏洞(CNVD-2014-09221) | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09222 | OTRS Help Desk安全机制绕过漏洞 | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09223 | Info-ZIP UnZip远程堆缓冲区溢出漏洞 | 2014-12-29 | 2014-12-30 |
| cnvd-2014-09224 | Huawei USG9560/9520/9580 Main Processing Unit (MPU)内存泄露漏洞 | 2014-12-29 | 2014-12-30 |
| cnvd-2014-09225 | Huawei WS318预测随机数发生器漏洞 | 2014-12-29 | 2014-12-30 |
| cnvd-2014-09226 | Huawei Tecal E9000 Chassis IPMICommand处理权限提升漏洞 | 2014-12-29 | 2014-12-30 |
| cnvd-2014-09227 | Huawei Tecal RH Series存在多个漏洞 | 2014-12-28 | 2014-12-30 |
| cnvd-2014-09228 | WordPress WP Symposium插件'tray' SQL注入漏洞 | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09229 | WordPress WP Symposium插件存在多个跨站脚本漏洞 | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09230 | Linux Kernel本地信息泄露漏洞(CNVD-2014-09230) | 2014-12-30 | 2014-12-31 |
| cnvd-2014-09231 | libsndfile 'file_io.c' Divide-By-Zero拒绝服务漏洞 | 2014-12-30 | 2014-12-31 |
| cnvd-2014-09232 | libsndfile 'src/sd2.c'存在多个缓冲区溢出漏洞 | 2014-12-30 | 2014-12-31 |
| cnvd-2014-09233 | OpenStack Neutron存在多个安全绕过漏洞 | 2014-12-30 | 2014-12-31 |
| cnvd-2014-09234 | Koha存在多个跨站脚本漏洞 | 2014-12-30 | 2014-12-31 |
| cnvd-2014-09235 | elfutils '/libelf/elf_begin.c'目录遍历漏洞 | 2014-12-30 | 2014-12-31 |
| cnvd-2014-09236 | PHP Double Free拒绝服务漏洞 | 2014-12-30 | 2014-12-31 |
| cnvd-2014-09237 | IDA Pro存在多个漏洞(CNVD-2014-09237) | 2014-12-28 | 2014-12-31 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2000-avi-015 | Vulnérabilité dans l'en-tête des mèls sous Outlook | 2000-07-19T00:00:00.000000 | 2000-07-19T00:00:00.000000 |
| certa-2000-avi-016 | Vulnérabilités dans Internet Explorer 4.01, Office 2000 et PowerPoint 97 | 2000-07-19T00:00:00.000000 | 2000-07-19T00:00:00.000000 |
| CERTA-2000-AVI-017 | Vulnérabilité du service Telnet sous Windows 2000 | 2000-07-25T00:00:00.000000 | 2000-07-25T00:00:00.000000 |
| certa-2000-avi-017 | Vulnérabilité du service Telnet sous Windows 2000 | 2000-07-25T00:00:00.000000 | 2000-07-25T00:00:00.000000 |
| CERTA-2000-AVI-018 | Vulnérabilité sous Netscape 4.73 et antérieures | 2000-07-27T00:00:00.000000 | 2000-07-27T00:00:00.000000 |
| CERTA-2000-AVI-019 | Virus sous Autocad2000 | 2000-07-27T00:00:00.000000 | 2000-07-27T00:00:00.000000 |
| CERTA-2000-AVI-020 | Vulnérabilité sous Adobe Acrobat | 2000-07-27T00:00:00.000000 | 2000-07-27T00:00:00.000000 |
| certa-2000-avi-018 | Vulnérabilité sous Netscape 4.73 et antérieures | 2000-07-27T00:00:00.000000 | 2000-07-27T00:00:00.000000 |
| certa-2000-avi-019 | Virus sous Autocad2000 | 2000-07-27T00:00:00.000000 | 2000-07-27T00:00:00.000000 |
| certa-2000-avi-020 | Vulnérabilité sous Adobe Acrobat | 2000-07-27T00:00:00.000000 | 2000-07-27T00:00:00.000000 |
| CERTA-2000-AVI-021 | Vulnérabilité dans le protocole NBNS sous Windows NT et 2000 | 2000-07-28T00:00:00.000000 | 2000-07-28T00:00:00.000000 |
| certa-2000-avi-021 | Vulnérabilité dans le protocole NBNS sous Windows NT et 2000 | 2000-07-28T00:00:00.000000 | 2000-07-28T00:00:00.000000 |
| CERTA-2000-AVI-022 | Vulnérabilités sous Firewall-1 | 2000-08-03T00:00:00.000000 | 2000-08-03T00:00:00.000000 |
| certa-2000-avi-022 | Vulnérabilités sous Firewall-1 | 2000-08-03T00:00:00.000000 | 2000-08-03T00:00:00.000000 |
| CERTA-2000-AVI-023 | Vulnérabilité dans le « Service Control Manager » de Windows 2000 | 2000-08-07T00:00:00.000000 | 2000-08-07T00:00:00.000000 |
| certa-2000-avi-023 | Vulnérabilité dans le « Service Control Manager » de Windows 2000 | 2000-08-07T00:00:00.000000 | 2000-08-07T00:00:00.000000 |
| CERTA-2000-AVI-024 | Vulnérabilités dans les programmes et librairies d'impression sous Solaris | 2000-08-08T00:00:00.000000 | 2000-08-08T00:00:00.000000 |
| CERTA-2000-AVI-025 | Vulnérabilité de Windows 9x avec le protocole IPX | 2000-08-08T00:00:00.000000 | 2000-08-08T00:00:00.000000 |
| certa-2000-avi-024 | Vulnérabilités dans les programmes et librairies d'impression sous Solaris | 2000-08-08T00:00:00.000000 | 2000-08-08T00:00:00.000000 |
| certa-2000-avi-025 | Vulnérabilité de Windows 9x avec le protocole IPX | 2000-08-08T00:00:00.000000 | 2000-08-08T00:00:00.000000 |
| CERTA-2000-AVI-026 | Vulnérabilité de Netscape avec Java | 2000-08-09T00:00:00.000000 | 2000-08-09T00:00:00.000000 |
| certa-2000-avi-026 | Vulnérabilité de Netscape avec Java | 2000-08-09T00:00:00.000000 | 2000-08-09T00:00:00.000000 |
| CERTA-2000-AVI-027 | Débordement de mémoire dans les documents HTML d'Office 2000 | 2000-08-16T00:00:00.000000 | 2000-08-16T00:00:00.000000 |
| CERTA-2000-AVI-028 | Vulnérabilité dans les permissions de fichiers sous IIS version 4.0 et 5.0 | 2000-08-16T00:00:00.000000 | 2000-08-16T00:00:00.000000 |
| certa-2000-avi-027 | Débordement de mémoire dans les documents HTML d'Office 2000 | 2000-08-16T00:00:00.000000 | 2000-08-16T00:00:00.000000 |
| certa-2000-avi-028 | Vulnérabilité dans les permissions de fichiers sous IIS version 4.0 et 5.0 | 2000-08-16T00:00:00.000000 | 2000-08-16T00:00:00.000000 |
| CERTA-2000-AVI-029 | Faille dans le démon telnetd sous IRIX de SGI | 2000-08-17T00:00:00.000000 | 2000-08-17T00:00:00.000000 |
| CERTA-2000-AVI-030 | Vulnérabilité sous Internet Information Server 5.0 | 2000-08-17T00:00:00.000000 | 2000-08-17T00:00:00.000000 |
| CERTA-2000-AVI-031 | Faille dans la commande newgrp sous HP-UX | 2000-08-17T00:00:00.000000 | 2000-08-17T00:00:00.000000 |
| certa-2000-avi-029 | Faille dans le démon telnetd sous IRIX de SGI | 2000-08-17T00:00:00.000000 | 2000-08-17T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTA-2000-ALE-016 | Connexion à Wanadoo | 2000-11-30T00:00:00.000000 | 2000-11-30T00:00:00.000000 |
| certa-2000-ale-016 | Connexion à Wanadoo | 2000-11-30T00:00:00.000000 | 2000-11-30T00:00:00.000000 |
| CERTA-2001-ALE-001 | Propagation du ver Ramen sous Linux. | 2001-01-19T00:00:00.000000 | 2001-01-19T00:00:00.000000 |
| certa-2001-ale-001 | Propagation du ver Ramen sous Linux. | 2001-01-19T00:00:00.000000 | 2001-01-19T00:00:00.000000 |
| CERTA-2001-ALE-002 | Risque d'exploitation des ressources partagées sous Windows | 2001-03-26T00:00:00.000000 | 2001-03-26T00:00:00.000000 |
| CERTA-2001-ALE-003 | Prolifération du ver Li0n | 2001-03-26T00:00:00.000000 | 2001-03-26T00:00:00.000000 |
| certa-2001-ale-002 | Risque d'exploitation des ressources partagées sous Windows | 2001-03-26T00:00:00.000000 | 2001-03-26T00:00:00.000000 |
| certa-2001-ale-003 | Prolifération du ver Li0n | 2001-03-26T00:00:00.000000 | 2001-03-26T00:00:00.000000 |
| CERTA-2001-ALE-004 | Vulnérabilité dans le démon snmpXdmid sous Sun Solaris | 2001-03-30T00:00:00.000000 | 2001-03-30T00:00:00.000000 |
| certa-2001-ale-004 | Vulnérabilité dans le démon snmpXdmid sous Sun Solaris | 2001-03-30T00:00:00.000000 | 2001-03-30T00:00:00.000000 |
| CERTA-2001-ALE-005 | Vulnérabilités dans les modems ADSL d'Alcatel | 2001-04-11T00:00:00.000000 | 2001-04-11T00:00:00.000000 |
| certa-2001-ale-005 | Vulnérabilités dans les modems ADSL d'Alcatel | 2001-04-11T00:00:00.000000 | 2001-04-11T00:00:00.000000 |
| CERTA-2001-ALE-006 | Prolifération en Europe du virus HOMEPAGE | 2001-05-09T00:00:00.000000 | 2001-05-09T00:00:00.000000 |
| CERTA-2001-ALE-007 | Propagation d'un ver affectant sadmind et IIS | 2001-05-09T00:00:00.000000 | 2001-05-09T00:00:00.000000 |
| certa-2001-ale-006 | Prolifération en Europe du virus HOMEPAGE | 2001-05-09T00:00:00.000000 | 2001-05-09T00:00:00.000000 |
| certa-2001-ale-007 | Propagation d'un ver affectant sadmind et IIS | 2001-05-09T00:00:00.000000 | 2001-05-09T00:00:00.000000 |
| CERTA-2001-ALE-009 | Propagation importante du virus SirCam | 2001-07-24T00:00:00.000000 | 2001-07-26T00:00:00.000000 |
| certa-2001-ale-009 | Propagation importante du virus SirCam | 2001-07-24T00:00:00.000000 | 2001-07-26T00:00:00.000000 |
| CERTA-2001-ALE-008 | Propagation du ver « Code Red » | 2001-07-18T00:00:00.000000 | 2001-08-13T00:00:00.000000 |
| certa-2001-ale-008 | Propagation du ver « Code Red » | 2001-07-18T00:00:00.000000 | 2001-08-13T00:00:00.000000 |
| CERTA-2001-ALE-010 | Propagation du ver "Code Blue" | 2001-09-07T00:00:00.000000 | 2001-09-07T00:00:00.000000 |
| certa-2001-ale-010 | Propagation du ver "Code Blue" | 2001-09-07T00:00:00.000000 | 2001-09-07T00:00:00.000000 |
| CERTA-2001-ALE-011 | <TT>antivirus2001</TT> est un cheval de Troie | 2001-09-10T00:00:00.000000 | 2001-09-13T00:00:00.000000 |
| certa-2001-ale-011 | <TT>antivirus2001</TT> est un cheval de Troie | 2001-09-10T00:00:00.000000 | 2001-09-13T00:00:00.000000 |
| CERTA-2001-ALE-013 | Propagation du ver/virus NIMDA (Concept Virus) | 2001-09-19T00:00:00.000000 | 2001-09-19T00:00:00.000000 |
| certa-2001-ale-013 | Propagation du ver/virus NIMDA (Concept Virus) | 2001-09-19T00:00:00.000000 | 2001-09-19T00:00:00.000000 |
| CERTA-2001-ALE-014 | Risque de divulgation de données personnelles/confidentielles par des produits Microsoft | 2001-10-19T00:00:00.000000 | 2001-10-19T00:00:00.000000 |
| certa-2001-ale-014 | Risque de divulgation de données personnelles/confidentielles par des produits Microsoft | 2001-10-19T00:00:00.000000 | 2001-10-19T00:00:00.000000 |
| CERTA-2001-ALE-015 | Exploitation massive d'une ancienne vulnérabilité de SSH | 2001-11-19T00:00:00.000000 | 2001-11-19T00:00:00.000000 |
| certa-2001-ale-015 | Exploitation massive d'une ancienne vulnérabilité de SSH | 2001-11-19T00:00:00.000000 | 2001-11-19T00:00:00.000000 |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| GCVE-1-2025-0019 |
4 (4.0)
|
Path traversal vulnerability in EventReport for site-admin |
misp |
misp |
2025-11-26T14:47:00.000Z | 2025-11-28T07:27:42.721350Z |
| GCVE-1-2025-0030 |
6.2 (4.0)
|
A cross-site scripting (XSS) vulnerability in the MISP… |
misp |
misp |
2025-12-03T10:53:00.000Z | 2025-12-03T10:58:55.845341Z |
| GCVE-1-2025-0031 |
6.3 (4.0)
|
A cross-site scripting (XSS) vulnerability was identif… |
misp |
misp |
2025-12-03T10:58:19.835041Z | 2025-12-03T10:58:19.835041Z |
| GCVE-1-2025-0032 |
10 (4.0)
|
The default configuration of WatchGuard Firebox device… |
watchguard |
firebox |
2025-12-03T16:25:00.000Z | 2025-12-03T16:27:36.683434Z |