Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2004-0874 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-1123. Reason: This candidate is a reservation duplicate of CVE-2004-1123. Notes: All CVE users should reference CVE-2004-1123 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2004-12-05T05:00:00 | 2005-02-06T10:00:00 |
| CVE-2004-0890 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reasons: This candidate is a reservation duplicate of another candidate. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2004-12-08T05:00:00 | 2005-02-06T10:00:00 |
| CVE-2004-0910 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0815. Reason: This candidate is a reservation duplicate of CVE-2004-0815. Notes: All CVE users should reference CVE-2004-0815 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2004-09-28T04:00:00 | 2005-02-06T10:00:00 |
| CVE-2004-0954 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0597. Reason: This candidate is a reservation duplicate of CVE-2004-0597. Notes: All CVE users should reference CVE-2004-0597 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2004-10-21T04:00:00 | 2005-02-06T10:00:00 |
| CVE-2004-0955 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0599. Reason: This candidate is a reservation duplicate of CVE-2004-0599 (the first item listed in that candidate). Notes: All CVE users should reference CVE-2004-0599 instead of this candidate. All references and descriptions have been removed from this candidate to prevent accidental usage | N/A | N/A | 2004-11-04T05:00:00 | 2005-02-06T10:00:00 |
| CVE-2004-0973 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0457. Reason: This candidate is a reservation duplicate of CVE-2004-0457. Notes: All CVE users should reference CVE-2004-0457 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2004-10-20T04:00:00 | 2005-02-06T10:00:00 |
| CVE-2005-0228 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-1388. Reason: This candidate is a duplicate of CVE-2004-1388. Notes: All CVE users should reference CVE-2004-1388 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-02-06T05:00:00 | 2005-02-09T10:00:00 |
| CVE-2004-0868 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0866. Reason: This candidate is a duplicate of CVE-2004-0866. Notes: The description for CVE-2004-0866 was inadvertently attached to this issue instead. All CVE users should reference CVE-2004-0866 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2004-09-24T04:00:00 | 2005-02-15T10:00:00 |
| CVE-2004-1479 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0928. Reason: This candidate is a duplicate of CVE-2004-0928. Notes: All CVE users should reference CVE-2004-0928 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-02-13T05:00:00 | 2005-02-21T10:00:00 |
| CVE-2005-0683 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-0659. Reason: This candidate is a duplicate of CVE-2005-0659. Notes: All CVE users should reference CVE-2005-0659 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-03-07T05:00:00 | 2005-03-11T10:00:00 |
| CVE-2003-1130 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-1071. Reason: This candidate is a duplicate of CVE-2003-1071. Notes: All CVE users should reference CVE-2003-1071 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-03-12T05:00:00 | 2005-04-05T09:00:00 |
| CVE-2005-0122 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-0975. Reason: This candidate is a duplicate of CVE-2005-0975. Notes: All CVE users should reference CVE-2005-0975 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-01-20T05:00:00 | 2005-04-25T09:00:00 |
| CVE-2005-0951 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: this candidate was created as a result of an analysis error for a researcher advisory for an issue that already existed. It stated an incorrect parameter, which was not part of the vulnerability at all. Notes: CVE users should not reference this candidate at all | N/A | N/A | 2005-04-03T05:00:00 | 2005-04-26T09:00:00 |
| CVE-2005-1389 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-0175. Reason: This candidate is a duplicate of CVE-2005-0175. Notes: All CVE users should reference CVE-2005-0175 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-05-02T04:00:00 | 2005-05-04T09:00:00 |
| CVE-2005-1390 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-0174. Reason: This candidate is a duplicate of CVE-2005-0174. Notes: All CVE users should reference CVE-2005-0174 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-05-02T04:00:00 | 2005-05-04T09:00:00 |
| CVE-2003-0698 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0743. Reason: This candidate is a duplicate of CVE-2003-0743. Notes: All CVE users should reference CVE-2003-0743 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-04-14T04:00:00 | 2005-06-02T09:00:00 |
| CVE-2001-1492 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2001-1460. Reason: This candidate is a refinement duplicate of CVE-2001-1460. Notes: All CVE users should reference CVE-2001-1460 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-06-21T04:00:00 | 2005-07-12T09:00:00 |
| CVE-2005-2116 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-1921. Reason: This candidate is a duplicate of CVE-2005-1921. Notes: All CVE users should reference CVE-2005-1921 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-07-01T04:00:00 | 2005-07-12T09:00:00 |
| CVE-2004-2285 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-2022. Reason: This candidate is a duplicate of CVE-2004-2022. Notes: All CVE users should reference CVE-2004-2022 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-08-04T04:00:00 | 2005-08-10T09:00:00 |
| CVE-2005-2303 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-1218. Reason: This candidate is a duplicate of CVE-2005-1218. Notes: All CVE users should reference CVE-2005-1218 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-07-19T04:00:00 | 2005-08-10T09:00:00 |
| CVE-2004-2141 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-1827. Reason: This candidate is a duplicate of CVE-2004-1827. Notes: All CVE users should reference CVE-2004-1827 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-06-30T04:00:00 | 2005-08-19T09:00:00 |
| CVE-1999-0282 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-1584, CVE-1999-1586. Reason: This candidate combined references from one issue with the description from another issue. Notes: Users should consult CVE-1999-1584 and CVE-1999-1586 to obtain the appropriate name. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2000-02-04T05:00:00 | 2005-08-30T00:00:00 |
| CVE-2005-1958 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-1855. Reason: This candidate is a duplicate of CVE-2005-1855. Notes: All CVE users should reference CVE-2005-1855 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-06-14T04:00:00 | 2005-09-03T09:00:00 |
| CVE-2005-2133 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-1915. Reason: This candidate is a duplicate of CVE-2005-1915. Notes: All CVE users should reference CVE-2005-1915 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-07-05T04:00:00 | 2005-09-08T09:00:00 |
| CVE-2005-2802 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2872, CVE-2005-2873. Reason: this candidate's description originally combined two separate issues. Notes: All CVE users should consult CVE-2005-2872 and CVE-2005-2873 to determine the appropriate identifier for the issue | N/A | N/A | 2005-09-06T04:00:00 | 2005-09-15T09:00:00 |
| CVE-2005-2883 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2855. Reason: This candidate is a duplicate of CVE-2005-2855. Notes: All CVE users should reference CVE-2005-2855 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-09-14T04:00:00 | 2005-09-27T09:00:00 |
| CVE-2004-2404 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-2347. Reason: This candidate is a duplicate of CVE-2004-2347. Notes: All CVE users should reference CVE-2004-2347 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-08-17T04:00:00 | 2005-10-14T09:00:00 |
| CVE-2004-9998 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate has been used as a placeholder by multiple organizations for multiple issues, but it is invalid. Notes: All CVE users should search CVE for the proper identifier. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-02-12T05:00:00 | 2005-10-14T09:00:00 |
| CVE-2005-3195 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-3178. Reason: this candidate is a duplicate of CVE-2005-3178; the duplicate arose from a pre-candidate that was not deleted during the editing phase. Notes: All CVE users should reference CVE-2005-3178 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-10-14T04:00:00 | 2005-10-18T09:00:00 |
| CVE-1999-0531 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "An SMTP service supports EXPN, VRFY, HELP, ESMTP, and/or EHLO. | N/A | N/A | 2000-02-04T05:00:00 | 2005-11-02T10:00:00 |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2001-1589 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none | N/A | N/A | 2020-11-05T19:47:08 | 2020-11-05T19:47:08 |
| CVE-2001-1590 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none | N/A | N/A | 2020-11-05T19:47:31 | 2020-11-05T19:47:31 |
| CVE-2001-1591 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none | N/A | N/A | 2020-11-05T19:48:08 | 2020-11-05T19:48:08 |
| CVE-2001-1592 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none | N/A | N/A | 2020-11-05T19:48:31 | 2020-11-05T19:48:31 |
| CVE-2002-0035 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2002. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2002-0192 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-0193, CVE-2002-1564. Reason: This candidate was published with a description that identified a different vulnerability than what was identified in the original authoritative reference. Notes: Consult CVE-2002-0193 or CVE-2002-1564 to find the identifier for the proper issue | N/A | N/A | 2002-05-17T04:00:00 | 2005-02-04T00:00:00 |
| CVE-2002-0390 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-0639. Reason: This candidate is a reservation duplicate of CVE-2002-0639. Notes: All CVE users should reference CVE-2002-0639 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2019-07-21T14:42:32 | 2019-07-21T14:42:32 |
| CVE-2002-0633 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2002. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2002-0634 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2002. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2002-0635 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2002. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2002-0646 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-0371. Reason: This candidate is a reservation duplicate of CVE-2002-0371. Notes: CVE-2002-0371 should be used instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2002-10-15T04:00:00 | 2005-02-06T10:00:00 |
| CVE-2002-0828 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-0862. Reason: This is a duplicate of CVE-2002-0862. Notes: All CVE users should reference CVE-2002-0862 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2002-08-07T04:00:00 | 2005-02-04T00:00:00 |
| CVE-2002-0841 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-0842. Reason: This candidate is a duplicate of CVE-2002-0842. The duplicate assignment was made before public disclosure. Notes: none | N/A | N/A | 2003-02-21T05:00:00 | 2004-01-26T10:00:00 |
| CVE-2002-1161 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1380. Reason: This candidate is a reservation duplicate of CVE-2002-1380. Notes: none | N/A | N/A | 2002-12-18T05:00:00 | 2004-01-26T10:00:00 |
| CVE-2002-1234 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-0180. Reason: This candidate is a an out-of-band assignment duplicate of CVE-2002-0180. Notes: All CVE users should reference CVE-2002-0180 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2002-10-25T04:00:00 | 2003-02-26T10:00:00 |
| CVE-2002-1259 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1286. Reason: This candidate is a reservation duplicate of CVE-2002-1286. Notes: All CVE users should reference CVE-2002-1286 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2002-12-18T05:00:00 | 2005-02-06T10:00:00 |
| CVE-2002-1261 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1292. Reason: This candidate is a reservation duplicate of CVE-2002-1292. Notes: All CVE users should reference CVE-2002-1292 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2002-12-17T05:00:00 | 2002-12-18T10:00:00 |
| CVE-2002-1263 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1295. Reason: This candidate is a reservation duplicate of CVE-2002-1295. Notes: All CVE users should reference CVE-2002-1295 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2003-01-03T05:00:00 | 2005-02-06T10:00:00 |
| CVE-2002-1297 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2002. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2002-1298 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2002. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2002-1299 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2002. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2002-1300 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2002. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2002-1301 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2002. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2002-1302 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2002. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2002-1303 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2002. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2002-1304 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2002. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2002-1305 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2002. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2002-1370 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1367. Reason: This CAN was originally assigned for the theft of root certificates in CUPS, but it was later deemed to be a legitimate result of exploiting a different vulnerability, CVE-2002-1367, so it is not a distinct vulnerability. Notes: All CVE users should reference CVE-2002-1367 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-04-15T04:00:00Z | 2024-09-16T20:37:14.873Z |
| CVE-2002-1404 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1348. Reason: This candidate is a reservation duplicate of CVE-2002-1348. Notes: All CVE users should reference CVE-2002-1348 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2003-02-05T05:00:00 | 2003-02-11T10:00:00 |
| CVE-2002-1638 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-2153. Reason: This candidate is a duplicate of CVE-2002-2153. Notes: All CVE users should reference CVE-2002-2153 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-03-28T05:00:00 | 2007-10-18T09:00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2001-1589 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:13.380 | 2023-11-07T01:55:45.593 |
| fkie_cve-2001-1590 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:13.443 | 2023-11-07T01:55:45.807 |
| fkie_cve-2001-1591 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:13.520 | 2023-11-07T01:55:46.023 |
| fkie_cve-2001-1592 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:13.583 | 2023-11-07T01:55:46.230 |
| fkie_cve-2002-0035 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.463 | 2023-11-07T01:55:46.767 |
| fkie_cve-2002-0192 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-0193, CVE-2002-1564. Reas… | 2002-05-29T04:00:00.000 | 2023-11-07T01:55:48.243 |
| fkie_cve-2002-0390 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-0639. Reason: This candidat… | 2019-07-21T15:15:10.187 | 2023-11-07T01:55:49.613 |
| fkie_cve-2002-0633 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.480 | 2023-11-07T01:55:52.150 |
| fkie_cve-2002-0634 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.510 | 2023-11-07T01:55:52.373 |
| fkie_cve-2002-0635 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.540 | 2023-11-07T01:55:52.600 |
| fkie_cve-2002-0646 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-0371. Reason: This candid… | 2005-05-02T04:00:00.000 | 2023-11-07T01:55:52.917 |
| fkie_cve-2002-0828 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-0862. Reason: This is a d… | 2002-08-12T04:00:00.000 | 2023-11-07T01:55:54.620 |
| fkie_cve-2002-0841 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-0842. Reason: This candid… | 2003-03-03T05:00:00.000 | 2023-11-07T01:55:55.017 |
| fkie_cve-2002-1161 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1380. Reason: This candid… | 2002-12-23T05:00:00.000 | 2023-11-07T01:55:57.747 |
| fkie_cve-2002-1234 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-0180. Reason: This candid… | 2002-11-04T05:00:00.000 | 2023-11-07T01:55:58.243 |
| fkie_cve-2002-1259 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1286. Reason: This candid… | 2002-12-23T05:00:00.000 | 2023-11-07T01:55:58.413 |
| fkie_cve-2002-1261 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1292. Reason: This candid… | 2002-12-23T05:00:00.000 | 2023-11-07T01:55:58.457 |
| fkie_cve-2002-1263 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1295. Reason: This candid… | 2003-01-07T05:00:00.000 | 2023-11-07T01:55:58.493 |
| fkie_cve-2002-1297 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.557 | 2023-11-07T01:55:58.747 |
| fkie_cve-2002-1298 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.587 | 2023-11-07T01:55:58.963 |
| fkie_cve-2002-1299 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.603 | 2023-11-07T01:55:59.173 |
| fkie_cve-2002-1300 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.637 | 2023-11-07T01:55:59.387 |
| fkie_cve-2002-1301 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.650 | 2023-11-07T01:55:59.657 |
| fkie_cve-2002-1302 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.683 | 2023-11-07T01:55:59.880 |
| fkie_cve-2002-1303 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.697 | 2023-11-07T01:56:00.090 |
| fkie_cve-2002-1304 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.730 | 2023-11-07T01:56:00.310 |
| fkie_cve-2002-1305 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.743 | 2023-11-07T01:56:00.527 |
| fkie_cve-2002-1370 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1367. Reason: This CAN wa… | 2005-05-02T04:00:00.000 | 2023-11-07T01:56:01.340 |
| fkie_cve-2002-1404 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1348. Reason: This candid… | 2003-02-19T05:00:00.000 | 2023-11-07T01:56:01.770 |
| fkie_cve-2002-1638 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-2153. Reason: This candid… | 2002-05-27T04:00:00.000 | 2023-11-07T01:56:03.917 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-fmr4-7g9q-7hc7 |
|
Moderate severity vulnerability that affects handlebars | 2017-10-24T18:33:36Z | 2020-06-17T16:30:43Z |
| ghsa-hg7c-66ff-9q8g |
|
Sandbox bypass in constantinople | 2020-07-31T16:18:53Z | 2020-07-31T16:18:53Z |
| ghsa-chgg-rrmv-5q7x |
|
Withdrawn | 2020-08-03T18:05:48Z | 2020-08-03T18:05:48Z |
| ghsa-p56r-jr4p-4wgh |
|
Withdrawn | 2020-08-03T18:16:37Z | 2020-08-03T18:16:37Z |
| ghsa-wx84-69jh-jjp2 |
|
Withdrawn | 2020-08-03T18:22:36Z | 2020-08-03T18:22:36Z |
| ghsa-xw5p-hw6r-2j98 |
|
Denial of service in fastify | 2020-08-05T14:53:22Z | 2020-08-03T21:25:40Z |
| ghsa-9xgp-hfw7-73rq |
|
Authentication Weakness in keystone | 2020-08-19T21:30:04Z | 2020-08-19T21:30:04Z |
| ghsa-mpcx-8qqw-rmcq |
|
SQL Injection in waterline-sequel | 2020-08-19T21:51:20Z | 2020-08-19T21:51:20Z |
| ghsa-4x7c-cx64-49w8 |
|
Regular Expression Denial of Service in is-my-json-valid | 2020-08-19T22:06:03Z | 2020-08-19T22:06:03Z |
| ghsa-qrg3-f6h6-vq8q |
|
Denial of Service in https-proxy-agent | 2020-08-19T22:15:57Z | 2020-08-19T22:15:57Z |
| ghsa-4gpv-cvmq-6526 |
|
Denial of Service in protobufjs | 2020-08-19T22:23:09Z | 2020-08-19T22:23:09Z |
| ghsa-q9r2-f3vc-rjg8 |
|
Command Injection in macaddress | 2020-08-19T22:28:51Z | 2020-08-19T22:28:51Z |
| ghsa-69p9-9qm9-h447 |
|
Sandbox Breakout / Arbitrary Code Execution in safer-eval | 2020-08-19T22:34:43Z | 2020-08-19T22:34:43Z |
| ghsa-m45f-4828-5cv5 |
|
Regular Expression Denial of Service in highcharts | 2020-08-19T22:39:44Z | 2020-08-19T22:39:44Z |
| ghsa-x4rf-4mqf-cm8w |
|
Open Redirect in ecstatic | 2020-08-19T22:44:22Z | 2020-08-19T22:44:23Z |
| ghsa-h29r-4vqp-8jxf |
|
Cross-Site Scripting in keystone | 2020-08-20T17:21:46Z | 2020-08-20T17:21:46Z |
| ghsa-c6h2-mpc6-232h |
|
Command Injection in dns-sync | 2020-08-27T22:26:15Z | 2020-08-27T22:27:20Z |
| ghsa-c5j4-vw9m-xc95 |
|
Open Redirect in hekto | 2020-08-27T22:44:08Z | 2020-08-27T22:44:08Z |
| ghsa-5j4m-89xf-mf5p |
|
Missing Origin Validation in parcel-bundler | 2020-08-27T22:58:46Z | 2020-08-27T22:58:46Z |
| ghsa-84fq-6626-w5fg |
|
CORS Token Disclosure in crumb | 2017-10-24T18:33:36Z | 2020-08-31T18:07:28Z |
| ghsa-m273-wwfv-h6jp |
|
Directory Traversal in fancy-server | 2020-08-31T22:44:33Z | 2020-08-31T18:07:38Z |
| ghsa-g4xp-36c3-f7mr |
|
Hidden Directories Always Served in inert | 2020-08-31T22:47:41Z | 2020-08-31T18:07:50Z |
| ghsa-c7hr-j4mj-j2w6 |
|
Verification Bypass in jsonwebtoken | 2018-10-09T00:38:30Z | 2020-08-31T18:07:57Z |
| ghsa-f9cm-p3w6-xvr3 |
|
Denial-of-Service Extended Event Loop Blocking in qs | 2018-10-09T00:38:48Z | 2020-08-31T18:08:25Z |
| ghsa-f9vc-q3hh-qhfv |
|
Content Injection in remarkable | 2020-08-31T22:56:00Z | 2020-08-31T18:08:29Z |
| ghsa-vwrf-r5r4-7775 |
|
Incorrect handling of CORS preflight request headers in hapi | 2018-06-07T19:43:25Z | 2020-08-31T18:09:06Z |
| ghsa-h9x2-5rm7-x4gm |
|
Insecure Comparison in secure-compare | 2019-06-03T17:28:23Z | 2020-08-31T18:09:18Z |
| ghsa-rc8h-3fv6-pxv8 |
|
Denial of Service in hapi | 2018-06-07T19:43:15Z | 2020-08-31T18:09:46Z |
| ghsa-j3g2-m5jj-6336 |
|
Unsafe Merging of CORS Configuration Conflict in hapi | 2020-09-01T15:20:00Z | 2020-08-31T18:09:51Z |
| ghsa-fvq6-55gv-jx9f |
|
SQL Injection in mysql | 2020-09-01T15:21:05Z | 2020-08-31T18:09:53Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2020-155 |
|
Waitress version 1.4.2 allows a DOS attack When waitress receives a header that contains … | waitress | 2020-02-04T03:15:00Z | 2020-02-06T18:46:00Z |
| pysec-2020-147 |
|
TUF (aka The Update Framework) through 0.12.1 has Improper Verification of a Cryptographi… | tuf | 2020-02-05T16:15:00Z | 2020-02-07T19:19:00Z |
| pysec-2019-110 |
|
An issue was discovered in Pillow before 6.2.0. When reading specially crafted invalid im… | pillow | 2019-10-04T22:15:00Z | 2020-02-18T16:15:00Z |
| pysec-2020-84 |
|
libImaging/FliDecode.c in Pillow before 6.2.2 has an FLI buffer overflow. | pillow | 2020-01-03T01:15:00Z | 2020-02-18T16:15:00Z |
| pysec-2019-136 |
|
Waitress through version 1.3.1 implemented a "MAY" part of the RFC7230 which states: "Alt… | waitress | 2019-12-20T23:15:00Z | 2020-02-25T17:15:00Z |
| pysec-2019-137 |
|
Waitress through version 1.3.1 would parse the Transfer-Encoding header and only look for… | waitress | 2019-12-20T23:15:00Z | 2020-02-25T17:15:00Z |
| pysec-2019-138 |
|
In Waitress through version 1.4.0, if a proxy server is used in front of waitress, an inv… | waitress | 2019-12-26T17:15:00Z | 2020-02-25T17:15:00Z |
| pysec-2020-176 |
|
PyYAML 5.1 through 5.1.2 has insufficient restrictions on the load and load_all functions… | pyyaml | 2020-02-19T04:15:00Z | 2020-03-01T00:15:00Z |
| pysec-2020-149 |
|
The _encode_invalid_chars function in util/url.py in the urllib3 library 1.25.2 through 1… | urllib3 | 2020-03-06T20:15:00Z | 2020-03-09T16:55:00Z |
| pysec-2019-130 |
|
typed_ast 1.3.0 and 1.3.1 has a handle_keywordonly_args out-of-bounds read. An attacker w… | typed-ast | 2019-11-26T15:15:00Z | 2020-03-14T02:15:00Z |
| pysec-2019-131 |
|
typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An attacker with t… | typed-ast | 2019-11-26T15:15:00Z | 2020-03-14T02:15:00Z |
| pysec-2020-91 |
|
An issue was discovered in psd-tools before 1.9.4. The Cython implementation of RLE decod… | psd-tools | 2020-03-14T18:15:00Z | 2020-03-19T16:41:00Z |
| pysec-2020-40 |
|
An issue was discovered in drf-jwt 1.15.x before 1.15.1. It allows attackers with access … | drf-jwt | 2020-03-15T22:15:00Z | 2020-03-19T17:38:00Z |
| pysec-2020-41 |
|
In EasyBuild before version 4.1.2, the GitHub Personal Access Token (PAT) used by EasyBui… | easybuild-framework | 2020-03-19T17:15:00Z | 2020-03-23T18:15:00Z |
| pysec-2020-111 |
|
The svglib package through 0.9.3 for Python allows XXE attacks via an svg2rlg call. | svglib | 2020-03-20T23:15:00Z | 2020-03-24T20:38:00Z |
| pysec-2019-106 |
|
NLTK Downloader before 3.4.5 is vulnerable to a directory traversal, allowing attackers t… | nltk | 2019-08-22T16:15:00Z | 2020-03-27T10:15:00Z |
| pysec-2020-101 |
|
The command-line "safety" package for Python has a potential security issue. There are tw… | safety | 2020-03-23T23:15:00Z | 2020-03-30T16:16:00Z |
| pysec-2019-3 |
|
A flaw was found in ansible 2.8.0 before 2.8.4. Fields managing sensitive data should be … | ansible | 2019-11-25T16:15:00Z | 2020-04-13T00:15:00Z |
| pysec-2020-160 |
|
Ansible, versions 2.9.x before 2.9.1, 2.8.x before 2.8.7 and Ansible versions 2.7.x befor… | ansible | 2020-01-02T15:15:00Z | 2020-04-13T00:15:00Z |
| pysec-2020-152 |
|
In Wagtail before versions 2.8.1 and 2.7.2, a cross-site scripting (XSS) vulnerability ex… | wagtail | 2020-04-14T23:15:00Z | 2020-04-15T19:15:00Z |
| pysec-2020-144 |
|
In Tortoise ORM before versions 0.15.23 and 0.16.6, various forms of SQL injection have b… | tortoise-orm | 2020-04-20T22:15:00Z | 2020-04-28T17:16:00Z |
| pysec-2019-15 |
|
Django 2.1 before 2.1.15 and 2.2 before 2.2.8 allows unintended model editing. A Django m… | django | 2019-12-02T14:15:00Z | 2020-05-01T02:15:00Z |
| pysec-2020-153 |
|
In Wagtail before versions 2.7.2 and 2.8.2, a potential timing attack exists on pages or … | wagtail | 2020-04-30T23:15:00Z | 2020-05-08T15:57:00Z |
| pysec-2020-66 |
|
MISP MISP-maltego 1.4.4 incorrectly shares a MISP connection across users in a remote-tra… | misp-maltego | 2020-05-15T18:15:00Z | 2020-05-19T13:38:00Z |
| pysec-2020-107 |
|
** DISPUTED ** scikit-learn (aka sklearn) through 0.23.0 can unserialize and execute comm… | scikit-learn | 2020-05-15T19:15:00Z | 2020-05-19T19:05:00Z |
| pysec-2020-73 |
|
** DISPUTED ** pandas through 1.0.3 can unserialize and execute commands from an untruste… | pandas | 2020-05-15T19:15:00Z | 2020-05-19T19:12:00Z |
| pysec-2020-2 |
|
An archive traversal flaw was found in all ansible-engine versions 2.9.x prior to 2.9.7, … | ansible | 2020-04-30T17:15:00Z | 2020-05-21T14:49:00Z |
| pysec-2019-5 |
|
Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerabi… | ansible | 2019-03-27T13:29:00Z | 2020-05-21T14:55:00Z |
| pysec-2020-65 |
|
python-markdown2 through 2.3.8 allows XSS because element names are mishandled unless a \… | markdown2 | 2020-04-20T16:15:00Z | 2020-05-25T06:15:00Z |
| pysec-2020-13 |
|
A flaw was found in the Ansible Engine affecting Ansible Engine versions 2.7.x before 2.7… | ansible | 2020-05-12T18:15:00Z | 2020-05-26T17:38:00Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2013-1875 | command_wrap Gem for Ruby contains a flaw that is triggered during the handling of input … | 2013-03-18T00:00:00.000Z |
| gsd-2013-1854 | The Active Record component in Ruby on Rails 2.3.x before 2.3.18, 3.1.x before 3.1.12, an… | 2013-03-19T00:00:00.000Z |
| gsd-2013-1855 | The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in… | 2013-03-19T00:00:00.000Z |
| gsd-2013-1856 | The ActiveSupport XML parsing functionality supports multiple pluggable backends. One bac… | 2013-03-19T00:00:00.000Z |
| gsd-2013-1857 | The sanitize helper in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the… | 2013-03-19T00:00:00.000Z |
| gsd-2013-1898 | Thumbshooter Gem for Ruby contains a flaw that is due to the program failing to properly … | 2013-03-26T00:00:00.000Z |
| gsd-2013-1911 | ldoce Gem for Ruby contains a flaw that is triggered during the handling of a specially c… | 2013-04-01T00:00:00.000Z |
| gsd-2013-1947 | kelredd-pruview Gem for Ruby contains a flaw in /lib/pruview/document.rb. The issue is tr… | 2013-04-04T00:00:00.000Z |
| gsd-2013-1933 | Karteek Docsplit Gem for Ruby contains a flaw that is due to the program failing to prope… | 2013-04-08T00:00:00.000Z |
| gsd-2013-1948 | md2pdf Gem for Ruby contains a flaw that is due to the program failing to properly saniti… | 2013-04-13T00:00:00.000Z |
| gsd-2013-2090 | Creme Fraiche Gem for Ruby contains a flaw that is due to the program failing to properly… | 2013-05-14T00:00:00.000Z |
| gsd-2013-2105 | Show In Browser Gem for Ruby contains a flaw that is triggered when the application does … | 2013-05-17T00:00:00.000Z |
| gsd-2013-2119 | Phusion Passenger gem before 3.0.21 and 4.0.x before 4.0.5 for Ruby allows local users to… | 2013-05-29T00:00:00.000Z |
| gsd-2013-4136 | ext/common/ServerInstanceDir.h in Phusion Passenger gem before 4.0.6 for Ruby allows loca… | 2013-06-10T00:00:00.000Z |
| gsd-2014-2538 | Cross-site scripting (XSS) vulnerability in lib/rack/ssl.rb in the rack-ssl gem before 1.… | 2013-07-09T00:00:00.000Z |
| gsd-2013-4170 | In general, Ember.js escapes or strips any user-supplied content before inserting it in s… | 2013-07-25T00:00:00.000Z |
| gsd-2013-4203 | rgpg Gem for Ruby contains a flaw in the GpgHelper module (lib/rgpg/gpg_helper.rb). The i… | 2013-08-02T00:00:00.000Z |
| gsd-2013-5647 | Sounder Gem for Ruby contains a flaw that is triggered during the handling of file names.… | 2013-08-14T00:00:00.000Z |
| gsd-2013-4318 | Features Gem for Ruby contains a flaw that allows a local cross-site scripting (XSS) atta… | 2013-09-01T00:00:00.000Z |
| gsd-2013-5671 | fog-dragonfly Gem for Ruby contains a flaw that is due to the program failing to properly… | 2013-09-03T00:00:00.000Z |
| gsd-2013-4287 | Algorithmic complexity vulnerability in Gem::Version::VERSION_PATTERN in lib/rubygems/ver… | 2013-09-09T00:00:00.000Z |
| gsd-2013-6459 | Cross-site scripting (XSS) vulnerability in the will_paginate gem before 3.0.5 for Ruby a… | 2013-09-19T00:00:00.000Z |
| gsd-2013-4363 | Algorithmic complexity vulnerability in Gem::Version::ANCHORED_VERSION_PATTERN in lib/rub… | 2013-09-24T00:00:00.000Z |
| gsd-2013-7463 | The aescrypt gem 1.0.0 for Ruby does not randomize the CBC IV for use with the AESCrypt.e… | 2013-10-01T00:00:00.000Z |
| gsd-2013-4413 | Wicked Gem for Ruby contains a flaw that is due to the program failing to properly saniti… | 2013-10-08T00:00:00.000Z |
| gsd-2013-4389 | Multiple format string vulnerabilities in log_subscriber.rb files in the log subscriber c… | 2013-10-16T00:00:00.000Z |
| gsd-2013-4457 | Cocaine Gem for Ruby contains a flaw that is due to the method of variable interpolation … | 2013-10-22T00:00:00.000Z |
| gsd-2013-4478 | Sup MUA contains a flaw that is triggered when handling email attachment content. This ma… | 2013-10-29T00:00:00.000Z |
| gsd-2013-4479 | Sup MUA contains a flaw that is triggered when handling email attachment content. This ma… | 2013-10-29T00:00:00.000Z |
| gsd-2013-4489 | GitLab Grit Gem for Ruby contains a flaw in the app/contexts/search_context.rb script. Th… | 2013-11-04T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| MAL-2022-231 | Malicious code in @epc-apps/api-generic-plan (npm) | 2022-05-16T07:13:13Z | 2022-05-16T07:13:14Z |
| MAL-2022-238 | Malicious code in @epc-infra/clinstestpackage (npm) | 2022-05-16T07:13:13Z | 2022-05-16T07:13:14Z |
| mal-2022-231 | Malicious code in @epc-apps/api-generic-plan (npm) | 2022-05-16T07:13:13Z | 2022-05-16T07:13:14Z |
| mal-2022-238 | Malicious code in @epc-infra/clinstestpackage (npm) | 2022-05-16T07:13:13Z | 2022-05-16T07:13:14Z |
| MAL-2022-239 | Malicious code in @epc-infra/dns-stack (npm) | 2022-05-16T07:13:33Z | 2022-05-16T07:13:33Z |
| MAL-2022-240 | Malicious code in @epc-infra/dynamo-stack (npm) | 2022-05-16T07:13:33Z | 2022-05-16T07:13:33Z |
| MAL-2022-241 | Malicious code in @epc-infra/region-only-policy (npm) | 2022-05-16T07:13:33Z | 2022-05-16T07:13:33Z |
| MAL-2022-242 | Malicious code in @epc-infra/stack-config (npm) | 2022-05-16T07:13:33Z | 2022-05-16T07:13:33Z |
| MAL-2022-244 | Malicious code in @epc-libraries/cdk-custom-resources (npm) | 2022-05-16T07:13:33Z | 2022-05-16T07:13:33Z |
| mal-2022-239 | Malicious code in @epc-infra/dns-stack (npm) | 2022-05-16T07:13:33Z | 2022-05-16T07:13:33Z |
| mal-2022-240 | Malicious code in @epc-infra/dynamo-stack (npm) | 2022-05-16T07:13:33Z | 2022-05-16T07:13:33Z |
| mal-2022-241 | Malicious code in @epc-infra/region-only-policy (npm) | 2022-05-16T07:13:33Z | 2022-05-16T07:13:33Z |
| mal-2022-242 | Malicious code in @epc-infra/stack-config (npm) | 2022-05-16T07:13:33Z | 2022-05-16T07:13:33Z |
| mal-2022-244 | Malicious code in @epc-libraries/cdk-custom-resources (npm) | 2022-05-16T07:13:33Z | 2022-05-16T07:13:33Z |
| MAL-2022-233 | Malicious code in @epc-apps/api-management-plan (npm) | 2022-05-16T07:13:34Z | 2022-05-16T07:13:35Z |
| mal-2022-233 | Malicious code in @epc-apps/api-management-plan (npm) | 2022-05-16T07:13:34Z | 2022-05-16T07:13:35Z |
| MAL-2022-245 | Malicious code in @epc-libraries/data-api-versions (npm) | 2022-05-16T07:14:57Z | 2022-05-16T07:14:57Z |
| mal-2022-245 | Malicious code in @epc-libraries/data-api-versions (npm) | 2022-05-16T07:14:57Z | 2022-05-16T07:14:57Z |
| MAL-2022-237 | Malicious code in @epc-infra/aurora-stack (npm) | 2022-05-16T07:15:02Z | 2022-05-16T07:15:02Z |
| MAL-2022-246 | Malicious code in @epc-libraries/driver-outage-db (npm) | 2022-05-16T07:15:02Z | 2022-05-16T07:15:02Z |
| mal-2022-237 | Malicious code in @epc-infra/aurora-stack (npm) | 2022-05-16T07:15:02Z | 2022-05-16T07:15:02Z |
| mal-2022-246 | Malicious code in @epc-libraries/driver-outage-db (npm) | 2022-05-16T07:15:02Z | 2022-05-16T07:15:02Z |
| MAL-2022-1929 | Malicious code in clinstestpackage (npm) | 2022-05-16T07:17:21Z | 2022-05-16T07:17:28Z |
| mal-2022-1929 | Malicious code in clinstestpackage (npm) | 2022-05-16T07:17:21Z | 2022-05-16T07:17:28Z |
| MAL-2022-247 | Malicious code in @epc-libraries/kinesis-service (npm) | 2022-05-16T07:19:35Z | 2022-05-16T07:19:35Z |
| mal-2022-247 | Malicious code in @epc-libraries/kinesis-service (npm) | 2022-05-16T07:19:35Z | 2022-05-16T07:19:35Z |
| MAL-2022-248 | Malicious code in @epc-libraries/utils (npm) | 2022-05-16T07:19:45Z | 2022-05-16T07:19:45Z |
| mal-2022-248 | Malicious code in @epc-libraries/utils (npm) | 2022-05-16T07:19:45Z | 2022-05-16T07:19:45Z |
| MAL-2022-236 | Malicious code in @epc-infra/app-lookup-stack (npm) | 2022-05-16T07:19:51Z | 2022-05-16T07:19:51Z |
| mal-2022-236 | Malicious code in @epc-infra/app-lookup-stack (npm) | 2022-05-16T07:19:51Z | 2022-05-16T07:19:51Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2022-0730 | libTIFF: Mehrere Schwachstellen ermöglichen Denial of Service | 2022-03-15T23:00:00.000+00:00 | 2022-12-07T23:00:00.000+00:00 |
| wid-sec-w-2022-0817 | Red Hat OpenStack: Schwachstelle ermöglicht Manipulation von Dateien | 2022-07-24T22:00:00.000+00:00 | 2022-12-07T23:00:00.000+00:00 |
| wid-sec-w-2022-1991 | QT: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2022-02-16T23:00:00.000+00:00 | 2022-12-07T23:00:00.000+00:00 |
| wid-sec-w-2022-2217 | Sophos Firewall: Mehrere Schwachstellen | 2022-12-01T23:00:00.000+00:00 | 2022-12-07T23:00:00.000+00:00 |
| wid-sec-w-2022-2261 | Avast Antivirus: Schwachstelle ermöglicht Denial of Service | 2022-12-07T23:00:00.000+00:00 | 2022-12-07T23:00:00.000+00:00 |
| wid-sec-w-2022-2262 | Jenkins: Mehrere Schwachstellen | 2022-12-07T23:00:00.000+00:00 | 2022-12-07T23:00:00.000+00:00 |
| wid-sec-w-2022-2263 | IBM Business Automation Workflow: Schwachstelle ermöglicht Cross-Site Scripting | 2022-12-07T23:00:00.000+00:00 | 2022-12-07T23:00:00.000+00:00 |
| wid-sec-w-2022-2264 | SOS GmbH JobScheduler: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2022-12-07T23:00:00.000+00:00 | 2022-12-07T23:00:00.000+00:00 |
| wid-sec-w-2022-2266 | Ivanti Endpoint Manager: Schwachstelle ermöglicht Codeausführung | 2022-12-07T23:00:00.000+00:00 | 2022-12-07T23:00:00.000+00:00 |
| wid-sec-w-2022-2267 | Drupal: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2022-12-07T23:00:00.000+00:00 | 2022-12-07T23:00:00.000+00:00 |
| wid-sec-w-2022-2268 | Synology DiskStation Manager: Schwachstellen ermöglichen nicht spezifizierten Angriff | 2022-12-07T23:00:00.000+00:00 | 2022-12-07T23:00:00.000+00:00 |
| wid-sec-w-2022-0341 | Ruby on Rails: Mehrere Schwachstellen | 2021-05-05T22:00:00.000+00:00 | 2022-12-08T23:00:00.000+00:00 |
| wid-sec-w-2022-1643 | RabbitMQ: Schwachstelle ermöglicht Offenlegung von Informationen | 2022-10-06T22:00:00.000+00:00 | 2022-12-08T23:00:00.000+00:00 |
| wid-sec-w-2022-2272 | Red Hat OpenStack: Mehrere Schwachstellen | 2022-12-08T23:00:00.000+00:00 | 2022-12-08T23:00:00.000+00:00 |
| wid-sec-w-2022-2274 | JetBrains IntelliJ IDEA: Mehrere Schwachstellen | 2022-12-08T23:00:00.000+00:00 | 2022-12-08T23:00:00.000+00:00 |
| wid-sec-w-2022-2275 | Red Hat OpenShift: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2022-12-08T23:00:00.000+00:00 | 2022-12-08T23:00:00.000+00:00 |
| wid-sec-w-2022-0197 | Apache log4j: Schwachstelle ermöglicht Codeausführung | 2021-12-28T23:00:00.000+00:00 | 2022-12-11T23:00:00.000+00:00 |
| wid-sec-w-2022-0601 | PHP: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2022-07-06T22:00:00.000+00:00 | 2022-12-11T23:00:00.000+00:00 |
| wid-sec-w-2022-0811 | Apache log4j: Schwachstelle ermöglicht Denial of Service | 2021-12-19T23:00:00.000+00:00 | 2022-12-11T23:00:00.000+00:00 |
| wid-sec-w-2022-1069 | Apache ActiveMQ Artemis: Schwachstelle ermöglicht Darstellen falscher Informationen | 2022-08-17T22:00:00.000+00:00 | 2022-12-11T23:00:00.000+00:00 |
| wid-sec-w-2022-1138 | Google Chrome: Schwachstelle ermöglicht Codeausführung | 2022-04-18T22:00:00.000+00:00 | 2022-12-11T23:00:00.000+00:00 |
| wid-sec-w-2022-1198 | Unicode Standards: Schwachstellen ermöglichen Umgehung von Sicherheitsmechanismem | 2021-10-31T23:00:00.000+00:00 | 2022-12-11T23:00:00.000+00:00 |
| wid-sec-w-2022-1403 | Microsoft Developer Tools: Mehrere Schwachstellen | 2022-09-13T22:00:00.000+00:00 | 2022-12-11T23:00:00.000+00:00 |
| wid-sec-w-2022-2195 | FreeBSD Project FreeBSD OS: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit den Rechten des Dienstes | 2022-11-29T23:00:00.000+00:00 | 2022-12-11T23:00:00.000+00:00 |
| wid-sec-w-2022-2278 | npm: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2021-11-14T23:00:00.000+00:00 | 2022-12-11T23:00:00.000+00:00 |
| wid-sec-w-2022-2285 | npm: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2022-12-11T23:00:00.000+00:00 | 2022-12-11T23:00:00.000+00:00 |
| wid-sec-w-2022-2289 | Symantec Messaging Gateway: Mehrere Schwachstellen ermöglichen Cross-Site Scripting | 2022-12-11T23:00:00.000+00:00 | 2022-12-11T23:00:00.000+00:00 |
| wid-sec-w-2022-1582 | GitLab: Mehrere Schwachstellen ermöglichen Cross-Site Scripting | 2022-09-29T22:00:00.000+00:00 | 2022-12-12T23:00:00.000+00:00 |
| wid-sec-w-2022-1814 | HPE Integrated Lights-Out: Mehrere Schwachstellen | 2021-05-25T22:00:00.000+00:00 | 2022-12-12T23:00:00.000+00:00 |
| wid-sec-w-2022-2291 | Micro Focus Operations Bridge: Schwachstelle ermöglicht Cross-Site Scripting | 2022-12-12T23:00:00.000+00:00 | 2022-12-12T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2024-0279 | Kwetsbaarheden verholpen in Microsoft Windows | 2024-07-09T18:40:21.043319Z | 2024-07-09T18:40:21.043319Z |
| ncsc-2024-0280 | Kwetsbaarheid verholpen in Microsoft Dynamics | 2024-07-09T18:40:31.321704Z | 2024-07-09T18:40:31.321704Z |
| ncsc-2024-0281 | Kwetsbaarheden verholpen in Microsoft Windows SQL Server | 2024-07-09T18:40:47.989197Z | 2024-07-09T18:40:47.989197Z |
| ncsc-2024-0282 | Kwetsbaarheden verholpen in Siemens Producten | 2024-07-09T18:40:57.534939Z | 2024-07-09T18:40:57.534939Z |
| ncsc-2024-0283 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2024-07-09T18:46:27.237285Z | 2024-07-09T18:46:27.237285Z |
| ncsc-2024-0284 | Kwetsbaarheden verholpen in Microsoft Office | 2024-07-09T19:37:26.015768Z | 2024-07-09T19:37:26.015768Z |
| ncsc-2024-0285 | Kwetsbaarheden verholpen in Microsoft Azure | 2024-07-09T19:38:21.052004Z | 2024-07-09T19:38:21.052004Z |
| ncsc-2024-0286 | Kwetsbaarheid verholpen in Microsoft System Center Defender for IoT | 2024-07-09T19:39:17.911628Z | 2024-07-09T19:39:17.911628Z |
| ncsc-2024-0287 | Kwetsbaarheden verholpen in Fortinet | 2024-07-10T08:27:35.622919Z | 2024-07-10T08:27:35.622919Z |
| ncsc-2024-0289 | Kwetsbaarheid verholpen in GitLab CE/EE | 2024-07-11T08:22:44.417794Z | 2024-07-11T08:22:44.417794Z |
| ncsc-2024-0288 | Kwetsbaarheden verholpen in Citrix Workspace, NetScaler ADC en NetScaler Gateway | 2024-07-10T13:54:21.933605Z | 2024-07-11T15:05:36.608570Z |
| ncsc-2024-0290 | Kwetsbaarheden verholpen in Juniper Junos OS en Junos OS Evolved | 2024-07-12T11:43:27.625950Z | 2024-07-12T11:43:27.625950Z |
| ncsc-2024-0291 | Kwetsbaarheden verholpen in Oracle Database Server | 2024-07-17T13:51:54.185475Z | 2024-07-17T13:51:54.185475Z |
| ncsc-2024-0292 | Kwetsbaarheden verholpen in Oracle Essbase | 2024-07-17T13:52:18.885359Z | 2024-07-17T13:52:18.885359Z |
| ncsc-2024-0293 | Kwetsbaarheden verholpen in Oracle Communications Applications | 2024-07-17T13:52:33.045762Z | 2024-07-17T13:52:33.045762Z |
| ncsc-2024-0294 | Kwetsbaarheden verholpen in Oracle Communications | 2024-07-17T13:52:53.293003Z | 2024-07-17T13:52:53.293003Z |
| ncsc-2024-0295 | Kwetsbaarheden verholpen in Oracle E-Business Suite | 2024-07-17T13:53:22.662201Z | 2024-07-17T13:53:22.662201Z |
| ncsc-2024-0296 | Kwetsbaarheden verholpen in Oracle Enterprise Manager | 2024-07-17T13:53:28.440252Z | 2024-07-17T13:53:28.440252Z |
| ncsc-2024-0297 | Kwetsbaarheden verholpen in Oracle Financial Services Applications | 2024-07-17T13:53:54.655859Z | 2024-07-17T13:53:54.655859Z |
| ncsc-2024-0298 | Kwetsbaarheden verholpen in Oracle Fusion Middleware | 2024-07-17T13:54:00.411174Z | 2024-07-17T13:54:00.411174Z |
| ncsc-2024-0299 | Kwetsbaarheden verholpen in Oracle Analytics | 2024-07-17T13:54:03.545073Z | 2024-07-17T13:54:03.545073Z |
| ncsc-2024-0300 | Kwetsbaarheid verholpen in Oracle Hyperion | 2024-07-17T13:54:07.536172Z | 2024-07-17T13:54:07.536172Z |
| ncsc-2024-0301 | Kwetsbaarheden verholpen in Oracle Java SE | 2024-07-17T13:54:46.188033Z | 2024-07-17T13:54:46.188033Z |
| ncsc-2024-0302 | Kwetsbaarheden verholpen in Oracle JD Edwards | 2024-07-17T13:54:52.031796Z | 2024-07-17T13:54:52.031796Z |
| ncsc-2024-0303 | Kwetsbaarheden verholpen in Oracle MySQL | 2024-07-17T13:54:56.036488Z | 2024-07-17T13:54:56.036488Z |
| ncsc-2024-0304 | Kwetsbaarheden verholpen in Oracle PeopleSoft | 2024-07-17T13:55:12.225033Z | 2024-07-17T13:55:12.225033Z |
| ncsc-2024-0305 | Kwetsbaarheden verholpen in Oracle Siebel CRM | 2024-07-17T13:55:31.923970Z | 2024-07-17T13:55:31.923970Z |
| ncsc-2024-0306 | Kwetsbaarheden verholpen in Oracle Supply Chain | 2024-07-17T13:55:37.062720Z | 2024-07-17T13:55:37.062720Z |
| ncsc-2024-0307 | Kwetsbaarheden verholpen in Oracle Systems | 2024-07-17T13:55:53.343378Z | 2024-07-17T13:55:53.343378Z |
| ncsc-2024-0308 | Kwetsbaarheden verholpen in Oracle Virtualization | 2024-07-17T13:55:57.768494Z | 2024-07-17T13:55:57.768494Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-434536 | SSA-434536: Memory Protection Bypass Vulnerability in SINUMERIK ONE and SINUMERIK MC | 2021-07-13T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-453715 | SSA-453715: Deserialization Vulnerability in CCOM Communication Component of Desigo CC Family | 2021-09-14T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-535380 | SSA-535380: Command Injection Vulnerability in Siveillance OIS Affecting Several Building Management Systems | 2021-09-14T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-692317 | SSA-692317: Authorization Bypass Vulnerability in Industrial Edge | 2021-09-14T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-756744 | SSA-756744: OS Command Injection Vulnerability in SINEC NMS | 2021-08-10T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-830194 | SSA-830194: Missing Authentication Vulnerability in S7-1200 Devices | 2021-08-10T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-835377 | SSA-835377: Missing Authentication Vulnerability in SINEMA Server | 2021-09-14T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-865327 | SSA-865327: Incorrect Authorization Vulnerability in Industrial Products | 2021-08-10T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-936080 | SSA-936080: Multiple Vulnerabilities in Third-Party Component libcurl | 2021-03-09T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-938030 | SSA-938030: DGN and PAR File Parsing Vulnerabilities in JT2Go and Teamcenter Visualization before V13.2.0.2 | 2021-08-10T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-944498 | SSA-944498: Buffer Overflow Vulnerability in Web Server of APOGEE and TALON Automation Devices | 2021-09-14T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-987403 | SSA-987403: Multiple Vulnerabilities in Teamcenter | 2021-09-14T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-997732 | SSA-997732: Modfem File Parsing Vulnerability in Simcenter Femap before V2021.2 | 2021-09-14T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-728618 | SSA-728618: Multiple Vulnerabilities in Solid Edge before SE2021MP8 | 2021-09-28T00:00:00Z | 2021-09-28T00:00:00Z |
| ssa-150692 | SSA-150692: Multiple Vulnerabilities in RUGGEDCOM ROX | 2021-09-14T00:00:00Z | 2021-10-12T00:00:00Z |
| ssa-163251 | SSA-163251: Multiple Vulnerabilities in SINEC NMS | 2021-10-12T00:00:00Z | 2021-10-12T00:00:00Z |
| ssa-173565 | SSA-173565: Denial-of-Service Vulnerability in RUGGEDCOM ROX Devices | 2021-10-12T00:00:00Z | 2021-10-12T00:00:00Z |
| ssa-178380 | SSA-178380: Denial-of-Service Vulnerability in SINUMERIK Controllers | 2021-10-12T00:00:00Z | 2021-10-12T00:00:00Z |
| ssa-500748 | SSA-500748: Denial-of-Service Vulnerabilities in SIPROTEC 5 Devices | 2021-09-14T00:00:00Z | 2021-10-12T00:00:00Z |
| ssa-538778 | SSA-538778: SmartVNC Vulnerabilities in SIMATIC HMI/WinCC Products | 2021-05-11T00:00:00Z | 2021-10-12T00:00:00Z |
| ssa-723417 | SSA-723417: Multiple Vulnerabilities in SCALANCE W1750D | 2021-05-11T00:00:00Z | 2021-10-12T00:00:00Z |
| ssa-847986 | SSA-847986: Denial-of-Service Vulnerabilities in SIPROTEC 5 relays | 2021-09-14T00:00:00Z | 2021-10-12T00:00:00Z |
| ssa-145157 | SSA-145157: Multiple Vulnerabilities in SIMATIC RTLS Locating Manager before V2.12 | 2021-11-09T00:00:00Z | 2021-11-09T00:00:00Z |
| ssa-328042 | SSA-328042: File Parsing Vulnerabilities in OBJ Translator in NX | 2021-11-09T00:00:00Z | 2021-11-09T00:00:00Z |
| ssa-338732 | SSA-338732: Information Disclosure Vulnerability in Mendix | 2021-11-09T00:00:00Z | 2021-11-09T00:00:00Z |
| ssa-537983 | SSA-537983: Local Code Execution Vulnerability in SENTRON powermanager V3 | 2021-11-09T00:00:00Z | 2021-11-09T00:00:00Z |
| ssa-740908 | SSA-740908: File Parsing Vulnerabilities in JT Translator in NX | 2021-11-09T00:00:00Z | 2021-11-09T00:00:00Z |
| ssa-755517 | SSA-755517: Path Traversal Vulnerability in Siveillance Video DLNA Server | 2021-11-09T00:00:00Z | 2021-11-09T00:00:00Z |
| ssa-779699 | SSA-779699: Two Incorrect Authorization Vulnerabilities in Mendix | 2021-11-09T00:00:00Z | 2021-11-09T00:00:00Z |
| ssa-044112 | SSA-044112: Multiple Vulnerabilities (NUCLEUS:13) in the TCP/IP Stack of Nucleus RTOS | 2021-11-09T00:00:00Z | 2021-12-14T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2014_1905 | Red Hat Security Advisory: Red Hat OpenShift Enterprise 1.2 - Final Retirement Notice | 2014-11-25T18:19:19+00:00 | 2024-05-02T15:00:13+00:00 |
| rhsa-2013:0997 | Red Hat Security Advisory: Red Hat SSA 3.2 and VSA 3.2 5-Month EOL Notice | 2013-06-27T16:45:00+00:00 | 2024-05-02T15:01:33+00:00 |
| rhsa-2013_0997 | Red Hat Security Advisory: Red Hat SSA 3.2 and VSA 3.2 5-Month EOL Notice | 2013-06-27T16:45:00+00:00 | 2024-05-02T15:01:33+00:00 |
| rhsa-2015:0860 | Red Hat Security Advisory: Red Hat Enterprise Linux OpenStack Platform 4.0 - 60 Day Retirement Notice | 2015-04-21T08:33:42+00:00 | 2024-05-02T15:07:54+00:00 |
| rhsa-2015_0860 | Red Hat Security Advisory: Red Hat Enterprise Linux OpenStack Platform 4.0 - 60 Day Retirement Notice | 2015-04-21T08:33:42+00:00 | 2024-05-02T15:07:54+00:00 |
| rhsa-2015:1127 | Red Hat Security Advisory: Red Hat Enterprise Linux OpenStack Platform 4.0 Retirement Notice | 2015-06-19T06:10:53+00:00 | 2024-05-02T15:10:44+00:00 |
| rhsa-2015_1127 | Red Hat Security Advisory: Red Hat Enterprise Linux OpenStack Platform 4.0 Retirement Notice | 2015-06-19T06:10:53+00:00 | 2024-05-02T15:10:44+00:00 |
| rhsa-2014:1063 | Red Hat Security Advisory: Transition Red Hat Network Classic Hosted to Red Hat Subscription Management | 2014-08-15T16:04:37+00:00 | 2024-05-02T15:10:53+00:00 |
| rhsa-2014:1064 | Red Hat Security Advisory: Transition Red Hat Network Classic Hosted to Red Hat Subscription Management | 2014-08-15T16:04:31+00:00 | 2024-05-02T15:10:53+00:00 |
| rhsa-2014_1063 | Red Hat Security Advisory: Transition Red Hat Network Classic Hosted to Red Hat Subscription Management | 2014-08-15T16:04:37+00:00 | 2024-05-02T15:10:53+00:00 |
| rhsa-2014_1064 | Red Hat Security Advisory: Transition Red Hat Network Classic Hosted to Red Hat Subscription Management | 2014-08-15T16:04:31+00:00 | 2024-05-02T15:10:53+00:00 |
| rhsa-2014:1068 | Red Hat Security Advisory: Transition Red Hat Network Classic Hosted to Red Hat Subscription Management | 2014-08-15T16:14:58+00:00 | 2024-05-02T15:11:03+00:00 |
| rhsa-2014_1068 | Red Hat Security Advisory: Transition Red Hat Network Classic Hosted to Red Hat Subscription Management | 2014-08-15T16:14:58+00:00 | 2024-05-02T15:11:03+00:00 |
| rhsa-2014:1070 | Red Hat Security Advisory: Transition Red Hat Network Classic Hosted to Red Hat Subscription Management | 2014-08-15T16:14:50+00:00 | 2024-05-02T15:11:09+00:00 |
| rhsa-2014_1070 | Red Hat Security Advisory: Transition Red Hat Network Classic Hosted to Red Hat Subscription Management | 2014-08-15T16:14:50+00:00 | 2024-05-02T15:11:09+00:00 |
| rhsa-2015:0753 | Red Hat Security Advisory: Red Hat Enterprise Developer Toolset Version 2 Six-Month Retirement Notice | 2015-03-30T07:58:20+00:00 | 2024-05-02T15:16:14+00:00 |
| rhsa-2015_0753 | Red Hat Security Advisory: Red Hat Enterprise Developer Toolset Version 2 Six-Month Retirement Notice | 2015-03-30T07:58:20+00:00 | 2024-05-02T15:16:14+00:00 |
| rhsa-2015:1691 | Red Hat Security Advisory: Red Hat Enterprise Developer Toolset Version 2 One-Month Retirement Notice | 2015-08-27T13:48:28+00:00 | 2024-05-02T15:16:22+00:00 |
| rhsa-2015_1691 | Red Hat Security Advisory: Red Hat Enterprise Developer Toolset Version 2 One-Month Retirement Notice | 2015-08-27T13:48:28+00:00 | 2024-05-02T15:16:22+00:00 |
| rhsa-2015:1853 | Red Hat Security Advisory: Red Hat Enterprise Developer Toolset Version 2 Retirement Notice | 2015-10-01T13:15:48+00:00 | 2024-05-02T15:17:04+00:00 |
| rhsa-2015_1853 | Red Hat Security Advisory: Red Hat Enterprise Developer Toolset Version 2 Retirement Notice | 2015-10-01T13:15:48+00:00 | 2024-05-02T15:17:04+00:00 |
| rhsa-2013:0570 | Red Hat Security Advisory: Oracle Java SE 6 - notification of end of public updates | 2013-02-26T21:12:00+00:00 | 2024-05-02T15:20:14+00:00 |
| rhsa-2013_0570 | Red Hat Security Advisory: Oracle Java SE 6 - notification of end of public updates | 2013-02-26T21:12:00+00:00 | 2024-05-02T15:20:14+00:00 |
| rhsa-2016:0699 | Red Hat Security Advisory: Red Hat Enterprise Developer Toolset Version 3.x Six-Month Retirement Notice | 2016-04-28T12:08:30+00:00 | 2024-05-02T15:25:00+00:00 |
| rhsa-2016_0699 | Red Hat Security Advisory: Red Hat Enterprise Developer Toolset Version 3.x Six-Month Retirement Notice | 2016-04-28T12:08:30+00:00 | 2024-05-02T15:25:00+00:00 |
| rhsa-2020:0824 | Red Hat Security Advisory: Open Liberty 20.0.0.3 Runtime security update | 2020-03-16T16:02:54+00:00 | 2024-05-02T15:26:00+00:00 |
| rhsa-2020_0824 | Red Hat Security Advisory: Open Liberty 20.0.0.3 Runtime security update | 2020-03-16T16:02:54+00:00 | 2024-05-02T15:26:00+00:00 |
| rhsa-2014:0340 | Red Hat Security Advisory: Red Hat Enterprise Developer Toolset Version 1 3-month Retirement Notice | 2014-03-31T16:37:21+00:00 | 2024-05-02T15:31:04+00:00 |
| rhsa-2014_0340 | Red Hat Security Advisory: Red Hat Enterprise Developer Toolset Version 1 3-month Retirement Notice | 2014-03-31T16:37:21+00:00 | 2024-05-02T15:31:04+00:00 |
| rhsa-2014:0575 | Red Hat Security Advisory: Red Hat Enterprise Developer Toolset Version 1 One-month Retirement Notice | 2014-05-29T19:35:24+00:00 | 2024-05-02T15:32:19+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-17-143-01 | Moxa OnCell | 2017-05-23T00:00:00.000000Z | 2017-05-23T00:00:00.000000Z |
| icsma-17-082-02 | ICSMA-17-082-02_B. Braun Medical SpaceCom Open Redirect Vulnerability | 2017-03-23T00:00:00.000000Z | 2017-05-23T00:00:00.000000Z |
| icsa-17-152-01 | Phoenix Broadband Technologies LLC PowerAgent SC3 Site Controller | 2017-06-01T00:00:00.000000Z | 2017-06-01T00:00:00.000000Z |
| icsa-17-157-01 | Rockwell Automation PanelView Plus 6 700-1500 | 2017-06-06T00:00:00.000000Z | 2017-06-06T00:00:00.000000Z |
| icsa-17-157-02 | Digital Canal Structural Wind Analysis | 2017-06-06T00:00:00.000000Z | 2017-06-06T00:00:00.000000Z |
| icsa-17-164-01 | Trihedral Engineering Limited VTScada | 2017-06-13T00:00:00.000000Z | 2017-06-13T00:00:00.000000Z |
| icsa-17-164-02 | OSIsoft PI Server 2017 | 2017-06-13T00:00:00.000000Z | 2017-06-13T00:00:00.000000Z |
| icsa-17-164-03 | OSIsoft PI Web API 2017 | 2017-06-13T00:00:00.000000Z | 2017-06-13T00:00:00.000000Z |
| icsa-17-166-01 | Cambium Networks ePMP | 2017-06-15T00:00:00.000000Z | 2017-06-15T00:00:00.000000Z |
| icsa-17-171-01 | Ecava IntegraXor | 2017-06-20T00:00:00.000000Z | 2017-06-20T00:00:00.000000Z |
| icsa-17-173-01 | Siemens SIMATIC CP 44x-1 Redundant Network Access Modules | 2017-06-22T00:00:00.000000Z | 2017-06-22T00:00:00.000000Z |
| icsa-17-173-02 | Siemens XHQ | 2017-06-22T00:00:00.000000Z | 2017-06-22T00:00:00.000000Z |
| icsa-17-178-01 | Newport XPS-Cx, XPS-Qx | 2017-06-27T00:00:00.000000Z | 2017-06-27T00:00:00.000000Z |
| icsa-17-180-03 | Siemens Viewport for Web Office Portal | 2017-06-29T00:00:00.000000Z | 2017-06-29T00:00:00.000000Z |
| icsa-17-187-01 | Siemens OZW672 and OZW772 | 2017-07-06T00:00:00.000000Z | 2017-07-06T00:00:00.000000Z |
| icsa-17-187-02 | Siemens Reyrolle | 2017-07-06T00:00:00.000000Z | 2017-07-06T00:00:00.000000Z |
| icsa-17-187-04 | Schneider Electric Wonderware ArchestrA Logger | 2017-07-06T00:00:00.000000Z | 2017-07-06T00:00:00.000000Z |
| icsa-17-187-05 | Schneider Electric Ampla MES | 2017-07-06T00:00:00.000000Z | 2017-07-06T00:00:00.000000Z |
| icsa-17-010-01a | OSIsoft PI Coresight and PI Web API (Update A) | 2017-01-10T00:00:00.000000Z | 2017-07-11T00:00:00.000000Z |
| icsa-17-180-01a | ICSA-17-180-01A_Siemens SIMATIC Industrial PCs, SINUMERIK Panel Control Unit, and SIMOTION P320 (Update A) | 2017-06-29T00:00:00.000000Z | 2017-07-11T00:00:00.000000Z |
| icsa-17-192-01 | Siemens SIMATIC Logon | 2017-07-11T00:00:00.000000Z | 2017-07-11T00:00:00.000000Z |
| icsa-17-192-02 | Fuji Electric V-Server | 2017-07-11T00:00:00.000000Z | 2017-07-11T00:00:00.000000Z |
| icsa-17-192-03 | ABB VSN300 WiFi Logger Card | 2017-07-11T00:00:00.000000Z | 2017-07-11T00:00:00.000000Z |
| icsa-17-192-04 | OSIsoft PI Coresight | 2017-07-11T00:00:00.000000Z | 2017-07-11T00:00:00.000000Z |
| icsa-17-192-06 | Schweitzer Engineering Laboratories, Inc. SEL-3620 and SEL-3622 | 2017-07-11T00:00:00.000000Z | 2017-07-11T00:00:00.000000Z |
| icsa-17-194-01 | Siemens SiPass integrated | 2017-07-13T00:00:00.000000Z | 2017-07-13T00:00:00.000000Z |
| icsa-17-194-03 | Siemens SIMATIC Sm@rtClient Android App | 2017-07-13T00:00:00.000000Z | 2017-07-13T00:00:00.000000Z |
| icsa-17-138-03 | Rockwell Automation MicroLogix 1100 Controllers | 2017-05-18T00:00:00.000000Z | 2017-07-18T00:00:00.000000Z |
| icsa-17-103-02a | Schneider Electric Modicon M221 PLCs and SoMachine Basic (Update A) | 2017-04-13T00:00:00.000000Z | 2017-07-20T00:00:00.000000Z |
| icsa-17-201-01 | Schneider Electric PowerSCADA Anywhere and Citect Anywhere | 2017-07-20T00:00:00.000000Z | 2017-07-20T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-20170726-anicrl | Cisco IOS XE Software Autonomic Networking Infrastructure Certificate Revocation Vulnerability | 2017-07-26T16:00:00+00:00 | 2018-01-31T14:47:00+00:00 |
| cisco-sa-20180131-ipv6 | Cisco Aggregation Services Router 9000 Series IPv6 Fragment Header Denial of Service Vulnerability | 2018-01-31T16:00:00+00:00 | 2018-01-31T16:00:00+00:00 |
| cisco-sa-20180207-asr | Cisco StarOS for Cisco ASR 5000 Series Aggregation Services Routers File Overwrite Vulnerability | 2018-02-07T16:00:00+00:00 | 2018-02-07T16:00:00+00:00 |
| cisco-sa-20180207-cpn | Cisco Prime Network TCP Denial of Service Vulnerability | 2018-02-07T16:00:00+00:00 | 2018-02-07T16:00:00+00:00 |
| cisco-sa-20180207-cps | Cisco Policy Suite RADIUS Authentication Bypass Vulnerability | 2018-02-07T16:00:00+00:00 | 2018-02-07T16:00:00+00:00 |
| cisco-sa-20180207-cps1 | Cisco Policy Suite RADIUS Authentication Information Disclosure Vulnerability | 2018-02-07T16:00:00+00:00 | 2018-02-07T16:00:00+00:00 |
| cisco-sa-20180207-cucm | Cisco Unified Communications Manager SQL Injection Vulnerability | 2018-02-07T16:00:00+00:00 | 2018-02-07T16:00:00+00:00 |
| cisco-sa-20180207-dcaf | Cisco Data Center Analytics Framework Stored Cross-Site Scripting Vulnerability | 2018-02-07T16:00:00+00:00 | 2018-02-07T16:00:00+00:00 |
| cisco-sa-20180207-dcaf1 | Cisco Data Center Analytics Framework Reflected Cross-Site Scripting Vulnerability | 2018-02-07T16:00:00+00:00 | 2018-02-07T16:00:00+00:00 |
| cisco-sa-20180207-esacsm | Cisco Email Security Appliance and Cisco Content Security Management Appliance Spam Quarantine Vulnerability | 2018-02-07T16:00:00+00:00 | 2018-02-07T16:00:00+00:00 |
| cisco-sa-20180207-fss | Cisco Firepower System Software BitTorrent File Policy Bypass Vulnerability | 2018-02-07T16:00:00+00:00 | 2018-02-07T16:00:00+00:00 |
| cisco-sa-20180207-iosxr | Cisco IOS XR Software Routing and Forwarding Inconsistency Denial of Service Vulnerability | 2018-02-07T16:00:00+00:00 | 2018-02-07T16:00:00+00:00 |
| cisco-sa-20180207-rv13x_2 | Cisco RV132W and RV134W Wireless VPN Routers Unauthenticated Information Disclosure Vulnerability | 2018-02-07T16:00:00+00:00 | 2018-02-07T16:00:00+00:00 |
| cisco-sa-20180207-spark | Cisco Spark Information Disclosure Vulnerability | 2018-02-07T16:00:00+00:00 | 2018-02-07T16:00:00+00:00 |
| cisco-sa-20180207-ucm | Cisco Unified Communications Manager Information Disclosure Vulnerability | 2018-02-07T16:00:00+00:00 | 2018-02-07T16:00:00+00:00 |
| cisco-sa-20180207-ucm1 | Cisco Unified Communications Manager Information Disclosure Vulnerability | 2018-02-07T16:00:00+00:00 | 2018-02-07T16:00:00+00:00 |
| cisco-sa-20180207-ucsc | Cisco UCS Central Arbitrary Command Execution Vulnerability | 2018-02-07T16:00:00+00:00 | 2018-02-07T16:00:00+00:00 |
| cisco-sa-20180207-vpcdi | Cisco Virtualized Packet Core-Distributed Instance Denial of Service Vulnerability | 2018-02-07T16:00:00+00:00 | 2018-02-07T16:00:00+00:00 |
| cisco-sa-20180207-ios | Cisco IOS XE Software Diagnostic Shell Path Traversal Vulnerability | 2018-02-07T16:00:00+00:00 | 2018-02-12T13:57:00+00:00 |
| cisco-sa-20180117-cvp | Cisco Unified Customer Voice Portal Denial of Service Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-02-15T20:49:00+00:00 |
| cisco-sa-20180221-cuc | Cisco Unity Connection Mail Relay Vulnerability | 2018-02-21T16:00:00+00:00 | 2018-02-21T16:00:00+00:00 |
| cisco-sa-20180221-cvp | Cisco Unified Customer Voice Portal Interactive Voice Response Connection Denial of Service Vulnerability | 2018-02-21T16:00:00+00:00 | 2018-02-21T16:00:00+00:00 |
| cisco-sa-20180221-dcaf | Cisco Data Center Analytics Framework Cross-Site Scripting Vulnerability | 2018-02-21T16:00:00+00:00 | 2018-02-21T16:00:00+00:00 |
| cisco-sa-20180221-dcaf1 | Cisco Data Center Analytics Framework Cross-Site Request Forgery Vulnerability | 2018-02-21T16:00:00+00:00 | 2018-02-21T16:00:00+00:00 |
| cisco-sa-20180221-jcf | Cisco Jabber Client Framework for Windows and Mac Cross-Site Scripting Vulnerability | 2018-02-21T16:00:00+00:00 | 2018-02-21T16:00:00+00:00 |
| cisco-sa-20180221-jcf1 | Cisco Jabber Client Framework for Windows and Mac Cross-Site Scripting Vulnerability | 2018-02-21T16:00:00+00:00 | 2018-02-21T16:00:00+00:00 |
| cisco-sa-20180221-pcpt | Cisco Prime Collaboration Provisioning Tool Web Portal Repeated Bad Login Attempts Denial of Service Vulnerability | 2018-02-21T16:00:00+00:00 | 2018-02-21T16:00:00+00:00 |
| cisco-sa-20180221-pcpt1 | Cisco Prime Collaboration Provisioning Tool User Provisioning Tab Cross-Site Scripting Vulnerability | 2018-02-21T16:00:00+00:00 | 2018-02-21T16:00:00+00:00 |
| cisco-sa-20180221-psc | Cisco Prime Service Catalog Cross-Site Scripting Vulnerability | 2018-02-21T16:00:00+00:00 | 2018-02-21T16:00:00+00:00 |
| cisco-sa-20180221-ucsd | Cisco UCS Director and Cisco Integrated Management Controller Supervisor Cross-Site Request Forgery Vulnerability | 2018-02-21T16:00:00+00:00 | 2018-02-21T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sca-2025-0008 | Multiple vulnerabilities in Endress+Hauser MEAC300-FNADE4 | 2025-07-03T13:00:00.000Z | 2025-07-03T13:00:00.000Z |
| sca-2025-0009 | Vulnerabilities affecting SICK TDC-E210GC | 2025-08-01T13:00:00.000Z | 2025-08-01T13:00:00.000Z |
| sca-2025-0010 | Multiple vulnerabilities in SICK Enterprise Analytics and SICK Logistic Analytics Products | 2025-10-02T13:00:00.000Z | 2025-10-02T13:00:00.000Z |
| sca-2025-0011 | Vulnerabilities affecting Endress+Hauser SSG-E210GC | 2025-10-02T13:00:00.000Z | 2025-10-02T13:00:00.000Z |
| sca-2025-0012 | Sudo vulnerability affects SICK SID products | 2025-10-27T11:00:00.000Z | 2025-10-27T14:00:00.000Z |
| sca-2025-0014 | CodeMeter vulnerablity affects SICK CODE-LOC and SICK LIDAR-LOC | 2025-11-03T11:00:00.000Z | 2025-11-03T14:00:00.000Z |
| sca-2025-0013 | Vulnerabilities affecting SICK TLOC100-100 | 2025-10-27T14:00:00.000Z | 2025-11-11T14:00:00.000Z |
| sca-2026-0001 | Vulnerabilities affecting SICK TDC-X401GL | 2026-01-15T14:00:00.000Z | 2026-01-15T14:00:00.000Z |
| sca-2026-0002 | Vulnerabilities affecting SICK Incoming Goods Suite | 2026-01-15T14:00:00.000Z | 2026-01-22T19:00:00.000Z |
| sca-2026-0003 | Vulnerability affecting SICK nanoScan3 and microScan3 | 2026-01-26T14:00:00.000Z | 2026-01-26T14:00:00.000Z |
| sca-2026-0004 | Eclipse Cyclone DDS Vulnerabilities have no impact on SICK picoScan150 & SICK picoScan120 products | 2026-02-13T14:00:00.000Z | 2026-02-13T14:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2020-12656 | gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug | 2020-05-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-12771 | An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails. | 2020-05-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-12888 | The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space. | 2020-05-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-13253 | sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process. | 2020-05-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-13361 | In QEMU 5.0.0 and earlier es1370_transfer_audio in hw/audio/es1370.c does not properly validate the frame count which allows guest OS users to trigger an out-of-bounds access during an es1370_write() operation. | 2020-05-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-13362 | In QEMU 5.0.0 and earlier megasas_lookup_frame in hw/scsi/megasas.c has an out-of-bounds read via a crafted reply_queue_head field from a guest OS user. | 2020-05-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-13659 | address_space_map in exec.c in QEMU 4.2.0 can trigger a NULL pointer dereference related to BounceBuffer. | 2020-06-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-13754 | hw/pci/msix.c in QEMU 4.2.0 allows guest OS users to trigger an out-of-bounds access via a crafted address in an msi-x mmio operation. | 2020-06-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-13776 | systemd through v245 mishandles numerical usernames such as ones composed of decimal digits or 0x followed by hex digits as demonstrated by use of root privileges when privileges of the 0x0 user account were intended. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000082. | 2020-06-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-13777 | GnuTLS 3.6.x before 3.6.14 uses incorrect cryptography for encrypting a session ticket (a loss of confidentiality in TLS 1.2 and an authentication bypass in TLS 1.3). The earliest affected version is 3.6.4 (2018-09-24) because of an error in a 2018-09-18 commit. Until the first key rotation the TLS server always uses wrong data in place of an encryption key derived from an application. | 2020-06-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-13791 | hw/pci/pci.c in QEMU 4.2.0 allows guest OS users to trigger an out-of-bounds access by providing an address near the end of the PCI configuration space. | 2020-06-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-13800 | ati-vga in hw/display/ati.c in QEMU 4.2.0 allows guest OS users to trigger infinite recursion via a crafted mm_index value during an ati_mm_read or ati_mm_write call. | 2020-06-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-13974 | An issue was discovered in the Linux kernel 4.4 through 5.7.1. drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case. | 2020-06-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14155 | libpcre in PCRE before 8.44 allows an integer overflow via a large number after a (?C substring. | 2020-06-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14539 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.6.48 and prior 5.7.30 and prior and 8.0.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14540 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 5.7.30 and prior and 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14547 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.7.30 and prior and 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14550 | Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.48 and prior 5.7.30 and prior and 8.0.20 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14553 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Pluggable Auth). Supported versions that are affected are 5.7.30 and prior and 8.0.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14559 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema). Supported versions that are affected are 5.6.48 and prior 5.7.30 and prior and 8.0.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14568 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14575 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14576 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: UDF). Supported versions that are affected are 5.7.30 and prior and 8.0.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14586 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14591 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Audit Plug-in). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14597 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14614 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14619 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Parser). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14620 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14623 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2017:0740-1 | Security update for Chromium | 2017-03-17T20:07:47Z | 2017-03-17T20:07:47Z |
| opensuse-su-2017:0790-1 | Security update for mbedtls | 2017-03-22T10:02:23Z | 2017-03-22T10:02:23Z |
| opensuse-su-2017:0792-1 | Security update for mbedtls | 2017-03-22T10:02:23Z | 2017-03-22T10:02:23Z |
| opensuse-su-2017:0908-1 | Security update for Chromium | 2017-04-01T16:49:09Z | 2017-04-01T16:49:09Z |
| opensuse-su-2017:0909-1 | Security update for Chromium | 2017-04-01T16:49:09Z | 2017-04-01T16:49:09Z |
| opensuse-su-2017:0916-1 | Recommended update for geotiff | 2017-04-04T06:16:31Z | 2017-04-04T06:16:31Z |
| opensuse-su-2017:0917-1 | Recommended update for geotiff | 2017-04-04T06:16:31Z | 2017-04-04T06:16:31Z |
| opensuse-su-2017:0958-1 | Security update for ffmpeg | 2017-04-07T09:00:09Z | 2017-04-07T09:00:09Z |
| opensuse-su-2017:0961-1 | Security update for ffmpeg | 2017-04-07T09:00:09Z | 2017-04-07T09:00:09Z |
| opensuse-su-2017:1098-1 | Security update for chromium | 2017-04-24T17:04:59Z | 2017-04-24T17:04:59Z |
| opensuse-su-2017:1100-1 | Security update for chromium | 2017-04-24T17:04:59Z | 2017-04-24T17:04:59Z |
| opensuse-su-2017:1190-1 | Security update for Chromium | 2017-05-06T18:38:52Z | 2017-05-06T18:38:52Z |
| opensuse-su-2017:1194-1 | Security update for Chromium | 2017-05-06T18:38:52Z | 2017-05-06T18:38:52Z |
| opensuse-su-2017:1268-1 | Security update for MozillaThunderbird | 2017-05-15T11:20:05Z | 2017-05-15T11:20:05Z |
| opensuse-su-2017:1254-1 | Security update for kauth, kdelibs4 | 2017-05-15T11:40:03Z | 2017-05-15T11:40:03Z |
| opensuse-su-2017:1272-1 | Security update for kauth, kdelibs4 | 2017-05-15T11:40:03Z | 2017-05-15T11:40:03Z |
| opensuse-su-2017:1501-1 | Security update for chromium | 2017-06-07T16:57:03Z | 2017-06-07T16:57:03Z |
| opensuse-su-2017:1502-1 | Security update for chromium | 2017-06-07T16:57:03Z | 2017-06-07T16:57:03Z |
| opensuse-su-2017:1505-1 | Security update for irssi | 2017-06-08T11:11:34Z | 2017-06-08T11:11:34Z |
| opensuse-su-2017:1515-1 | Security update for irssi | 2017-06-08T11:11:34Z | 2017-06-08T11:11:34Z |
| opensuse-su-2017:1532-1 | Security update for ffmpeg | 2017-06-11T09:31:21Z | 2017-06-11T09:31:21Z |
| opensuse-su-2017:1531-1 | Security update for ffmpeg | 2017-06-11T09:31:47Z | 2017-06-11T09:31:47Z |
| opensuse-su-2017:1579-1 | Security update for Mozilla Thunderbird | 2017-06-16T09:03:31Z | 2017-06-16T09:03:31Z |
| opensuse-su-2017:1591-1 | Security update for chromium | 2017-06-18T17:45:26Z | 2017-06-18T17:45:26Z |
| opensuse-su-2017:1593-1 | Security update for chromium | 2017-06-18T17:45:26Z | 2017-06-18T17:45:26Z |
| opensuse-su-2017:1649-1 | Security update for go | 2017-06-22T12:29:57Z | 2017-06-22T12:29:57Z |
| opensuse-su-2017:1650-1 | Security update for go | 2017-06-22T12:29:57Z | 2017-06-22T12:29:57Z |
| opensuse-su-2017:1748-1 | Security update for kdepim, messagelib | 2017-07-02T08:59:34Z | 2017-07-02T08:59:34Z |
| opensuse-su-2017:1756-1 | Security update for kdepim, messagelib | 2017-07-02T08:59:34Z | 2017-07-02T08:59:34Z |
| opensuse-su-2017:1765-1 | Security update for ffmpeg | 2017-07-04T08:13:18Z | 2017-07-04T08:13:18Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2021-285-01 | spaceLYnk, Wiser For KNX, fellerLYnk | 2021-10-12T00:00:00.000Z | 2021-10-12T00:00:00.000Z |
| sevd-2021-285-02 | ConneXium Network Manager (CNM) Software | 2021-10-12T00:00:00.000Z | 2021-10-12T00:00:00.000Z |
| sevd-2021-285-03 | IGSS (Interactive Graphical SCADA System) | 2021-10-12T00:00:00.000Z | 2021-10-12T00:00:00.000Z |
| sevd-2021-285-04 | Modicon M218 Logic Controller | 2021-10-12T00:00:00.000Z | 2021-10-12T00:00:00.000Z |
| sevd-2021-285-05 | Conext™ Advisor & Conext™ Control V2 | 2021-10-12T00:00:00.000Z | 2021-10-12T00:00:00.000Z |
| sevd-2021-313-01 | SCADAPack 300E Series RTU | 2021-11-09T00:00:00.000Z | 2021-11-09T00:00:00.000Z |
| sevd-2021-313-02 | Schneider Electric Software Update | 2021-11-09T00:00:00.000Z | 2021-11-09T00:00:00.000Z |
| sevd-2021-313-07 | Eurotherm GUIcon | 2021-11-09T00:00:00.000Z | 2021-11-09T00:00:00.000Z |
| sevd-2021-348-01 | IGSS (Interactive Graphical SCADA System) | 2021-12-14T00:00:00.000Z | 2021-12-14T00:00:00.000Z |
| sevd-2021-348-02 | EVlink City / Parking / Smart Wallbox Charging Stations | 2021-12-14T00:00:00.000Z | 2021-12-14T00:00:00.000Z |
| sevd-2021-348-04 | APC by Schneider Electric Rack PDU | 2021-12-14T00:00:00.000Z | 2021-12-21T00:00:00.000Z |
| sevd-2022-011-01 | Ethernet and Web server on Modicon M340 controller and Communication Modules | 2022-01-11T07:53:07.000Z | 2022-01-11T07:53:07.000Z |
| sevd-2022-011-02 | Easergy T300 | 2022-01-11T10:48:02.000Z | 2022-01-11T10:48:02.000Z |
| sevd-2022-011-04 | Easergy P3 | 2022-01-11T11:28:56.000Z | 2022-01-11T11:28:56.000Z |
| sevd-2022-011-05 | ConneXium Tofino Firewall and Loadable Security Modules | 2022-01-11T12:53:54.000Z | 2022-01-11T12:53:54.000Z |
| sevd-2022-011-07 | EcoStruxure™ Power Monitoring Expert | 2022-01-11T13:20:28.000Z | 2022-01-11T13:20:28.000Z |
| sevd-2022-039-01 | IGSS (Interactive Graphical SCADA System) | 2022-02-08T07:29:58.000Z | 2022-02-08T07:29:58.000Z |
| sevd-2022-039-02 | EcoStruxure EV Charging Expert | 2022-02-08T12:36:59.000Z | 2022-02-08T12:36:59.000Z |
| sevd-2022-039-05 | EcoStruxure Geo SCADA Expert | 2022-02-08T17:33:44.000Z | 2022-02-08T17:33:44.000Z |
| sevd-2022-039-03 | Easergy P40 | 2022-02-08T17:58:55.000Z | 2022-02-08T17:58:55.000Z |
| sevd-2022-039-06 | Harmony/Magelis iPC Series HMI, Vijeo Designer and Vijeo Designer Basic | 2022-02-08T23:25:23.000Z | 2022-02-08T23:25:23.000Z |
| sevd-2022-011-03 | Easergy P5 | 2022-01-11T11:05:25.000Z | 2022-03-02T11:05:25.000Z |
| sevd-2021-313-04 | Windows Print Spooler embedded in EcoStruxure™ Process Expert | 2021-11-09T08:45:48.000Z | 2022-03-08T08:45:48.000Z |
| sevd-2022-067-03 | Ritto Wiser™ Door | 2022-03-08T10:12:35.000Z | 2022-03-08T10:12:35.000Z |
| sevd-2022-039-04 | spaceLYnk, Wiser For KNX, fellerLYnk | 2022-02-08T20:32:52.000Z | 2022-03-08T20:32:52.000Z |
| sevd-2021-313-03 | APC by Schneider Electric Network Management Cards (NMC) and NMC Embedded Devices | 2021-11-09T06:30:00.000Z | 2022-05-10T00:00:00.00Z |
| sevd-2022-130-01 | PowerLogic ION Setup | 2022-05-10T00:00:00.00Z | 2022-05-10T00:00:00.00Z |
| sevd-2022-130-02 | Saitel DP RTU | 2022-05-10T00:00:00.00Z | 2022-05-10T00:00:00.00Z |
| sevd-2022-130-03 | Wiser Smart | 2022-05-10T00:00:00.00Z | 2022-05-10T00:00:00.00Z |
| sevd-2021-012-02 | EcoStruxure Power Build - Rapsody | 2021-01-12T08:32:35.000Z | 2022-06-14T18:30:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-consul-2022-24687 | 2024-03-06T10:52:21.903Z | 2025-04-03T14:40:37.652Z | |
| bit-consul-2022-29153 | 2024-03-06T10:52:10.905Z | 2025-04-03T14:40:37.652Z | |
| bit-consul-2022-40716 | 2024-03-06T10:51:50.990Z | 2025-04-03T14:40:37.652Z | |
| bit-couchdb-2020-1955 | 2024-03-06T10:51:42.871Z | 2025-04-03T14:40:37.652Z | |
| bit-discourse-2020-24327 | 2024-03-06T11:10:18.981Z | 2025-04-03T14:40:37.652Z | |
| bit-discourse-2022-23548 | 2024-03-06T11:07:21.771Z | 2025-04-03T14:40:37.652Z | |
| bit-discourse-2022-37458 | 2024-03-06T11:04:36.097Z | 2025-04-03T14:40:37.652Z | |
| bit-django-2020-13254 | 2024-03-06T10:56:35.291Z | 2025-04-03T14:40:37.652Z | |
| bit-django-2020-13596 | 2024-03-06T10:56:25.690Z | 2025-04-03T14:40:37.652Z | |
| bit-django-2020-24583 | 2024-03-06T10:56:12.583Z | 2025-04-03T14:40:37.652Z | |
| bit-django-2020-24584 | 2024-03-06T10:56:03.488Z | 2025-04-03T14:40:37.652Z | |
| bit-django-2020-7471 | 2024-03-06T10:55:54.362Z | 2025-04-03T14:40:37.652Z | |
| bit-django-2020-9402 | 2024-03-06T10:55:44.167Z | 2025-04-03T14:40:37.652Z | |
| bit-django-2021-28658 | 2024-03-06T10:55:24.264Z | 2025-04-03T14:40:37.652Z | |
| bit-django-2021-31542 | 2024-03-06T10:55:14.593Z | 2025-04-03T14:40:37.652Z | |
| bit-django-2021-32052 | 2024-03-06T10:55:03.094Z | 2025-04-03T14:40:37.652Z | |
| bit-django-2021-3281 | 2024-03-06T10:54:53.404Z | 2025-04-03T14:40:37.652Z | |
| bit-django-2021-33203 | 2024-03-06T10:54:44.570Z | 2025-04-03T14:40:37.652Z | |
| bit-django-2021-33571 | 2024-03-06T10:54:33.880Z | 2025-04-03T14:40:37.652Z | |
| bit-django-2021-35042 | 2024-03-06T10:54:20.393Z | 2025-04-03T14:40:37.652Z | |
| bit-django-2021-44420 | 2024-03-06T10:54:09.079Z | 2025-04-03T14:40:37.652Z | |
| bit-django-2021-45115 | 2024-03-06T10:53:58.206Z | 2025-04-03T14:40:37.652Z | |
| bit-django-2021-45116 | 2024-03-06T10:53:49.679Z | 2025-04-03T14:40:37.652Z | |
| bit-django-2021-45452 | 2024-03-06T10:53:37.905Z | 2025-04-03T14:40:37.652Z | |
| bit-django-2022-22818 | 2024-03-06T10:53:28.699Z | 2025-04-03T14:40:37.652Z | |
| bit-django-2022-23833 | 2024-03-06T10:53:17.707Z | 2025-04-03T14:40:37.652Z | |
| bit-django-2022-28346 | 2024-03-06T10:53:06.178Z | 2025-04-03T14:40:37.652Z | |
| bit-django-2022-28347 | 2024-03-06T10:52:57.760Z | 2025-04-03T14:40:37.652Z | |
| bit-django-2022-34265 | 2024-03-06T10:52:46.204Z | 2025-04-03T14:40:37.652Z | |
| bit-django-2022-36359 | 2024-03-06T10:52:34.080Z | 2025-04-03T14:40:37.652Z |
| ID | Description | Updated |
|---|---|---|
| var-202112-1879 | DIAEnergie Version 1.7.5 and prior is vulnerable to stored cross-site scripting when an u… | 2022-03-29T07:41:37.597000Z |
| var-202112-1880 | DIAEnergie Version 1.7.5 and prior is vulnerable to stored cross-site scripting when an u… | 2022-03-29T08:00:40.703000Z |
| var-202103-0922 | A vulnerability has been identified in Solid Edge SE2020 (All Versions < SE2020MP13), Sol… | 2022-05-04T06:52:37.767000Z |
| var-202106-0350 | Out of bound read in a subsystem in the Intel(R) CSME versions before 12.0.81, 13.0.47, 1… | 2022-05-04T06:52:37.371000Z |
| var-202103-1585 | A vulnerability has been identified in Solid Edge SE2020 (All versions < SE2020MP13), Sol… | 2022-05-04T06:53:34.594000Z |
| var-202107-0308 | A CWE-1236: Improper Neutralization of Formula Elements in a CSV File vulnerability exist… | 2022-05-04T06:53:42.999000Z |
| var-202001-0210 | IBM MQ and IBM MQ Appliance 8.0 and 9.0 LTS client connecting to a Queue Manager could ca… | 2022-05-04T07:01:18.851000Z |
| var-202103-1345 | A remote arbitrary file read vulnerability was discovered in some Aruba Instant Access Po… | 2022-05-04T07:08:42.064000Z |
| var-202109-1119 | A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The … | 2022-05-04T07:11:04.202000Z |
| var-202109-1121 | A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The … | 2022-05-04T07:11:58.756000Z |
| var-202109-1122 | A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The … | 2022-05-04T07:14:16.268000Z |
| var-200709-0225 | bgpd in Quagga before 0.99.9 allows explicitly configured BGP peers to cause a denial of … | 2022-05-04T07:17:23.402000Z |
| var-201204-0162 | The BGP implementation in bgpd in Quagga before 0.99.20.1 does not properly use message b… | 2022-05-04T07:19:31.075000Z |
| var-202103-1342 | A remote execution of arbitrary commands vulnerability was discovered in some Aruba Insta… | 2022-05-04T07:20:21.551000Z |
| var-202109-1825 | A vulnerability has been identified in NX 1980 Series (All versions < V1984), Solid Edge … | 2022-05-04T07:23:12.491000Z |
| var-202109-0606 | A vulnerability in the Unidirectional Link Detection (UDLD) feature of Cisco FXOS Softwar… | 2022-05-04T07:26:21.074000Z |
| var-202103-1343 | A remote arbitrary file modification vulnerability was discovered in some Aruba Instant A… | 2022-05-04T07:28:09.168000Z |
| var-202103-0054 | A remote buffer overflow vulnerability was discovered in some Aruba Instant Access Point … | 2022-05-04T07:36:43.554000Z |
| var-202106-0128 | Improper initialization in the firmware for some Intel(R) Processors may allow a privileg… | 2022-05-04T07:37:47.598000Z |
| var-202103-1335 | A remote execution of arbitrary commands vulnerability was discovered in some Aruba Insta… | 2022-05-04T07:46:36.400000Z |
| var-202109-1120 | A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The … | 2022-05-04T07:48:29.675000Z |
| var-200905-0194 | The BGP daemon (bgpd) in Quagga 0.99.11 and earlier allows remote attackers to cause a de… | 2022-05-04T07:50:34.944000Z |
| var-202109-1792 | A vulnerability has been identified in NX 1953 Series (All versions < V1973.3700), NX 198… | 2022-05-04T07:50:56.011000Z |
| var-202110-1663 | A remote denial of service vulnerability was discovered in Aruba Instant version(s): Arub… | 2022-05-04T07:54:35.747000Z |
| var-202103-1334 | A remote cross-site scripting (xss) vulnerability was discovered in some Aruba Instant Ac… | 2022-05-04T07:54:37.771000Z |
| var-202103-1586 | A vulnerability has been identified in Solid Edge SE2020 (All versions < SE2020MP13), Sol… | 2022-05-04T07:56:49.363000Z |
| var-202103-1347 | A remote arbitrary file modification vulnerability was discovered in some Aruba Instant A… | 2022-05-04T08:02:44.712000Z |
| var-202105-0832 | SAP NetWeaver AS ABAP, versions - 700, 701, 702, 730, 731, allow a high privileged attack… | 2022-05-04T08:07:07.551000Z |
| var-202106-0341 | Improper initialization in a subsystem in the Intel(R) CSME versions before 11.8.86, 11.1… | 2022-05-04T08:07:35.391000Z |
| var-202103-1340 | A remote arbitrary file modification vulnerability was discovered in some Aruba Instant A… | 2022-05-04T08:08:57.961000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2005-000778 | QRcode Perl CGI & PHP script vulnerable to denial of service attack | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000779 | Hiki cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000780 | Hiki cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000781 | Common Management Agent 3.x vulnerable to information leakage | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000782 | WirelessIP5000 has multiple vulnerabilities | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000783 | WirelessIP5000 has multiple vulnerabilities | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000784 | WirelessIP5000 has multiple vulnerabilities | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000785 | WirelessIP5000 has multiple vulnerabilities | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000786 | WirelessIP5000 has multiple vulnerabilities | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000787 | Pochy denial-of-service (DoS) vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000788 | FreeStyleWiki command injection vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000789 | Hyper NIKKI System cross-site request forgery vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000791 | Cross-site scripting vulnerability in the Unicode version of msearch | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000792 | eBASEweb SQL injection vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000793 | Hyper Estraier directory traversal/denial of service vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000794 | Kent Web PostMail vulnerable to third party mail relay | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000795 | HTTPD-User-Manage cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000796 | Multiple vulnerabilities in FreeStyleWiki including cross-site scripting | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000797 | Multiple vulnerabilities in FreeStyleWiki including cross-site scripting | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000798 | MitakeSearch cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000799 | Problem with referer header handling on mobile phone web browsers | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000800 | Opera bookmark function vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000801 | WebNote Clip vulnerable to OS command injection | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000802 | BBSNote cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000805 | nProtect Netizen has multiple vulnerabilities | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000864 | XOOPS cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000251 | SquirrelMail cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000293 | Sun Java System Web Server cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000326 | Mozilla Firefox vulnerable to HTTP response splitting | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000345 | Microsoft Internet Explorer address bar spoofing vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2015:0253-1 | Security update for glibc | 2014-08-29T01:15:58Z | 2014-08-29T01:15:58Z |
| suse-su-2015:0439-1 | Security update for glibc | 2014-08-29T01:15:58Z | 2014-08-29T01:15:58Z |
| suse-su-2015:0563-1 | Security update for python-django | 2014-09-03T15:51:02Z | 2014-09-03T15:51:02Z |
| suse-su-2015:0695-1 | Security update for python-django | 2014-09-03T15:51:02Z | 2014-09-03T15:51:02Z |
| suse-su-2015:0689-1 | Recommended update for apache2 | 2014-09-11T22:20:05Z | 2014-09-11T22:20:05Z |
| suse-ru-2015:0574-1 | Security update for powerpc-utils | 2014-09-12T14:57:27Z | 2014-09-12T14:57:27Z |
| suse-su-2015:0870-1 | Security update for kvm | 2014-09-19T14:41:45Z | 2014-09-19T14:41:45Z |
| suse-su-2015:0889-1 | Security update for kvm | 2014-09-19T14:41:45Z | 2014-09-19T14:41:45Z |
| suse-su-2015:1152-1 | Security update for kvm | 2014-09-19T14:41:45Z | 2014-09-19T14:41:45Z |
| suse-ru-2015:0621-1 | Security update for Linux kernel | 2014-09-24T00:35:24Z | 2014-09-24T00:35:24Z |
| suse-su-2015:0581-1 | Security update for Linux kernel | 2014-09-24T00:35:24Z | 2014-09-24T00:35:24Z |
| suse-su-2015:1174-1 | Security update for Linux kernel | 2014-09-24T00:35:24Z | 2014-09-24T00:35:24Z |
| suse-su-2015:0736-1 | Security update for Linux kernel | 2014-09-25T15:06:22Z | 2014-09-25T15:06:22Z |
| suse-su-2015:1376-1 | Security update for Linux kernel | 2014-09-25T15:06:22Z | 2014-09-25T15:06:22Z |
| suse-su-2015:0928-1 | Recommended update for sm-ncc-sync-data | 2014-09-29T23:11:22Z | 2014-09-29T23:11:22Z |
| suse-ru-2015:0462-1 | Recommended update for crowbar-barclamp-nova_dashboard | 2014-10-16T23:58:10Z | 2014-10-16T23:58:10Z |
| suse-su-2015:0792-1 | Recommended update for coreutils | 2014-10-16T23:59:36Z | 2014-10-16T23:59:36Z |
| suse-ru-2015:0562-1 | Security update for perl | 2014-10-22T00:23:40Z | 2014-10-22T00:23:40Z |
| suse-ru-2015:0769-1 | Security update for openssl1 | 2014-10-22T23:22:56Z | 2014-10-22T23:22:56Z |
| suse-su-2015:0546-1 | Security update for openssl1 | 2014-10-22T23:22:56Z | 2014-10-22T23:22:56Z |
| suse-su-2015:1185-1 | Security update for openssl1 | 2014-10-22T23:22:56Z | 2014-10-22T23:22:56Z |
| suse-su-2015:0336-1 | Security update for Java OpenJDK | 2014-10-24T14:17:30Z | 2014-10-24T14:17:30Z |
| suse-su-2015:0833-1 | Security update for Java OpenJDK | 2014-10-24T14:17:30Z | 2014-10-24T14:17:30Z |
| suse-su-2015:0545-2 | Security update for OpenSSL | 2014-10-24T22:07:03Z | 2014-10-24T22:07:03Z |
| suse-su-2015:1182-1 | Security update for OpenSSL | 2014-10-24T22:07:03Z | 2014-10-24T22:07:03Z |
| suse-su-2015:1182-2 | Security update for OpenSSL | 2014-10-24T22:07:03Z | 2014-10-24T22:07:03Z |
| suse-su-2015:1184-1 | Security update for OpenSSL | 2014-10-24T22:07:03Z | 2014-10-24T22:07:03Z |
| suse-su-403 | Security update for OpenSSL | 2014-10-24T22:07:03Z | 2014-10-24T22:07:03Z |
| suse-su-2015:0370-1 | Security update for php53 | 2014-10-28T10:05:33Z | 2014-10-28T10:05:33Z |
| suse-su-2015:0436-1 | Security update for php53 | 2014-10-28T10:05:33Z | 2014-10-28T10:05:33Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2014-09238 | IBM Security AppScan Enterprise信息泄露漏洞(CNVD-2014-09238) | 2014-12-26 | 2014-12-31 |
| cnvd-2014-09239 | IBM Security AppScan Enterprise任意命令执行漏洞 | 2014-12-26 | 2014-12-31 |
| cnvd-2014-09240 | IBM Security AppScan Enterprise跨站脚本漏洞 | 2014-12-26 | 2014-12-31 |
| cnvd-2014-09241 | IBM Security AppScan Enterprise任意代码执行漏洞 | 2014-12-26 | 2014-12-31 |
| cnvd-2014-09242 | MODX Revolution-pl跨站脚本漏洞 | 2014-12-26 | 2014-12-31 |
| cnvd-2014-09243 | Revive Adserver存在多个跨站请求伪造漏洞 | 2014-12-26 | 2014-12-31 |
| cnvd-2015-00001 | Apache HTTP Server安全绕过漏洞 | 2014-12-31 | 2015-01-04 |
| cnvd-2015-00002 | ManageEngine Desktop Central远程安全绕过漏洞 | 2015-01-04 | 2015-01-04 |
| cnvd-2015-00003 | Linux Kernel 'fragmentation.c'拒绝服务漏洞 | 2015-01-04 | 2015-01-04 |
| cnvd-2015-00004 | GetSimple CMS 'api.php' XML外部实体信息泄露漏洞 | 2015-01-04 | 2015-01-04 |
| cnvd-2015-00005 | RSA BSAFE Micro Edition Suite/SSL-J安全绕过漏洞 | 2014-12-31 | 2015-01-04 |
| cnvd-2015-00006 | Osclass 'contact.php'任意文件上传漏洞 | 2015-01-04 | 2015-01-04 |
| cnvd-2015-00007 | Osclass 'ajax.php'本地文件包含漏洞 | 2015-01-04 | 2015-01-04 |
| cnvd-2015-00008 | Osclass 'alert'参数SQL注入漏洞 | 2015-01-04 | 2015-01-04 |
| cnvd-2015-00009 | EMC Replication Manager/AppSync本地权限提升漏洞 | 2014-12-31 | 2015-01-04 |
| cnvd-2015-00010 | Ex Libris Patron Directory Services跨站脚本漏洞 | 2014-12-31 | 2015-01-04 |
| cnvd-2015-00011 | PHP 'apprentice.c'拒绝服务漏洞 | 2014-12-31 | 2015-01-04 |
| cnvd-2015-00012 | Contenido CMS 'front_content.php'存在多个跨站脚本漏洞 | 2014-12-31 | 2015-01-04 |
| cnvd-2015-00013 | Netcore(Netis)路由器53413/UDP后门服务漏洞 | 2014-12-31 | 2015-01-04 |
| cnvd-2015-00014 | libpng 'png_combine_row()'缓冲区溢出漏洞 | 2014-12-31 | 2015-01-04 |
| cnvd-2015-00015 | WordPress插件cformsII 'lib_nonajax.php'任意文件上传漏洞 | 2014-12-31 | 2015-01-04 |
| cnvd-2015-00016 | Gnupg2 'sm/gpgsm.c' Double Free拒绝服务漏洞 | 2014-12-31 | 2015-01-04 |
| cnvd-2015-00017 | Gnupg2 'dirmngr/ldapserver.c' Double Free拒绝服务漏洞 | 2014-12-31 | 2015-01-04 |
| cnvd-2015-00018 | Gnupg2 '/sm/minip12.c' Double Free拒绝服务漏洞 | 2014-12-31 | 2015-01-04 |
| cnvd-2015-00019 | Gnupg2 '/scd/command.c' Double Free拒绝服务漏洞 | 2014-12-31 | 2015-01-04 |
| cnvd-2015-00020 | WordPress插件Frontend Uploader 'errors'参数跨站脚本漏洞 | 2014-12-31 | 2015-01-04 |
| cnvd-2015-00021 | Notepad++存在未明缓冲区溢出漏洞 | 2014-12-31 | 2015-01-04 |
| cnvd-2015-00022 | Google Chrome拒绝服务漏洞(CNVD-2015-00022) | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00023 | Google Chrome拒绝服务漏洞(CNVD-2015-00023) | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00024 | Telerik UI for ASP.NET AJAX Q3绝对路径遍历漏洞 | 2015-01-04 | 2015-01-05 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2000-avi-030 | Vulnérabilité sous Internet Information Server 5.0 | 2000-08-17T00:00:00.000000 | 2000-08-17T00:00:00.000000 |
| certa-2000-avi-031 | Faille dans la commande newgrp sous HP-UX | 2000-08-17T00:00:00.000000 | 2000-08-17T00:00:00.000000 |
| CERTA-2000-AVI-032 | Vulnérabilité dans la machine virtuelle Java de Microsoft | 2000-08-22T00:00:00.000000 | 2000-08-22T00:00:00.000000 |
| CERTA-2000-AVI-033 | Vulnérabilité dans GNOME Updater | 2000-08-22T00:00:00.000000 | 2000-08-22T00:00:00.000000 |
| certa-2000-avi-032 | Vulnérabilité dans la machine virtuelle Java de Microsoft | 2000-08-22T00:00:00.000000 | 2000-08-22T00:00:00.000000 |
| certa-2000-avi-033 | Vulnérabilité dans GNOME Updater | 2000-08-22T00:00:00.000000 | 2000-08-22T00:00:00.000000 |
| CERTA-2000-AVI-034 | Faille dans le serveur Internet Java de SUN | 2000-08-23T00:00:00.000000 | 2000-08-23T00:00:00.000000 |
| certa-2000-avi-034 | Faille dans le serveur Internet Java de SUN | 2000-08-23T00:00:00.000000 | 2000-08-23T00:00:00.000000 |
| CERTA-2000-AVI-035 | Vulnérabilité dans Microsoft Information Server | 2000-08-28T00:00:00.000000 | 2000-08-28T00:00:00.000000 |
| certa-2000-avi-035 | Vulnérabilité dans Microsoft Information Server | 2000-08-28T00:00:00.000000 | 2000-08-28T00:00:00.000000 |
| CERTA-2000-AVI-036 | Cheval de Troie : Troj/qaz | 2000-08-29T00:00:00.000000 | 2000-08-29T00:00:00.000000 |
| CERTA-2000-AVI-037 | Vulnérabilité sous Windows 2000 dans la politique de sécurité locale | 2000-08-29T00:00:00.000000 | 2000-08-29T00:00:00.000000 |
| certa-2000-avi-036 | Cheval de Troie : Troj/qaz | 2000-08-29T00:00:00.000000 | 2000-08-29T00:00:00.000000 |
| certa-2000-avi-037 | Vulnérabilité sous Windows 2000 dans la politique de sécurité locale | 2000-08-29T00:00:00.000000 | 2000-08-29T00:00:00.000000 |
| CERTA-2000-AVI-038 | Vulnérabilité sous ISS REAL SECURE | 2000-08-30T00:00:00.000000 | 2000-08-30T00:00:00.000000 |
| CERTA-2000-AVI-039 | vulnérabilités de RPC.statd sous Unix | 2000-08-30T00:00:00.000000 | 2000-08-30T00:00:00.000000 |
| certa-2000-avi-038 | Vulnérabilité sous ISS REAL SECURE | 2000-08-30T00:00:00.000000 | 2000-08-30T00:00:00.000000 |
| certa-2000-avi-039 | vulnérabilités de RPC.statd sous Unix | 2000-08-30T00:00:00.000000 | 2000-08-30T00:00:00.000000 |
| CERTA-2000-AVI-040 | Vulnérabilité sous PGP 5.5.x à 6.5.3 | 2000-08-31T00:00:00.000000 | 2000-08-31T00:00:00.000000 |
| CERTA-2000-AVI-041 | Ver sous Windows : W32/Apology | 2000-08-31T00:00:00.000000 | 2000-08-31T00:00:00.000000 |
| certa-2000-avi-040 | Vulnérabilité sous PGP 5.5.x à 6.5.3 | 2000-08-31T00:00:00.000000 | 2000-08-31T00:00:00.000000 |
| certa-2000-avi-041 | Ver sous Windows : W32/Apology | 2000-08-31T00:00:00.000000 | 2000-08-31T00:00:00.000000 |
| CERTA-2000-AVI-042 | Vulnérabilité dans les extensions de fichiers sous Windows | 2000-09-04T00:00:00.000000 | 2000-09-04T00:00:00.000000 |
| CERTA-2000-AVI-043 | Vulnérabilité dans mgetty sous Unix | 2000-09-04T00:00:00.000000 | 2000-09-04T00:00:00.000000 |
| certa-2000-avi-042 | Vulnérabilité dans les extensions de fichiers sous Windows | 2000-09-04T00:00:00.000000 | 2000-09-04T00:00:00.000000 |
| certa-2000-avi-043 | Vulnérabilité dans mgetty sous Unix | 2000-09-04T00:00:00.000000 | 2000-09-04T00:00:00.000000 |
| CERTA-2000-AVI-044 | Vulnérabilité de Windows NT4.0 affectant Internet Information Server | 2000-09-07T00:00:00.000000 | 2000-09-07T00:00:00.000000 |
| CERTA-2000-AVI-045 | Note concernant les correctifs ou mises à jour | 2000-09-07T00:00:00.000000 | 2000-09-07T00:00:00.000000 |
| certa-2000-avi-044 | Vulnérabilité de Windows NT4.0 affectant Internet Information Server | 2000-09-07T00:00:00.000000 | 2000-09-07T00:00:00.000000 |
| certa-2000-avi-045 | Note concernant les correctifs ou mises à jour | 2000-09-07T00:00:00.000000 | 2000-09-07T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTA-2001-ALE-016 | Propagation du ver badtrans - variante B | 2001-11-27T00:00:00.000000 | 2001-11-27T00:00:00.000000 |
| certa-2001-ale-016 | Propagation du ver badtrans - variante B | 2001-11-27T00:00:00.000000 | 2001-11-27T00:00:00.000000 |
| CERTA-2001-ALE-012 | Rappels concernant les virus | 2001-09-13T00:00:00.000000 | 2002-01-09T00:00:00.000000 |
| certa-2001-ale-012 | Rappels concernant les virus | 2001-09-13T00:00:00.000000 | 2002-01-09T00:00:00.000000 |
| CERTA-2002-ALE-001 | Exploitation massive d'une faille de CDE | 2002-01-24T00:00:00.000000 | 2002-01-24T00:00:00.000000 |
| certa-2002-ale-001 | Exploitation massive d'une faille de CDE | 2002-01-24T00:00:00.000000 | 2002-01-24T00:00:00.000000 |
| CERTA-2002-ALE-002 | Exploitation d'une faille de wu-ftpd | 2002-01-28T00:00:00.000000 | 2002-01-28T00:00:00.000000 |
| certa-2002-ale-002 | Exploitation d'une faille de wu-ftpd | 2002-01-28T00:00:00.000000 | 2002-01-28T00:00:00.000000 |
| CERTA-2002-ALE-003 | Propagation importante du virus « W32.Myparty@mm » | 2002-01-29T00:00:00.000000 | 2002-01-29T00:00:00.000000 |
| certa-2002-ale-003 | Propagation importante du virus « W32.Myparty@mm » | 2002-01-29T00:00:00.000000 | 2002-01-29T00:00:00.000000 |
| CERTA-2002-ALE-004 | Multiples implémentations de SNMP V1 vulnérables | 2002-02-13T00:00:00.000000 | 2002-02-13T00:00:00.000000 |
| certa-2002-ale-004 | Multiples implémentations de SNMP V1 vulnérables | 2002-02-13T00:00:00.000000 | 2002-02-13T00:00:00.000000 |
| CERTA-2002-ALE-005 | Risque de compromission des auto-commutateurs (PABX) ALCATEL 4400 | 2002-02-20T00:00:00.000000 | 2002-02-20T00:00:00.000000 |
| certa-2002-ale-005 | Risque de compromission des auto-commutateurs (PABX) ALCATEL 4400 | 2002-02-20T00:00:00.000000 | 2002-02-20T00:00:00.000000 |
| CERTA-2002-ALE-006 | Propagation du ver Spida (Microsoft SQL Server) | 2002-05-22T00:00:00.000000 | 2002-06-04T00:00:00.000000 |
| certa-2002-ale-006 | Propagation du ver Spida (Microsoft SQL Server) | 2002-05-22T00:00:00.000000 | 2002-06-04T00:00:00.000000 |
| CERTA-2002-ALE-007 | Cédérom Pages Pro | 2002-09-04T00:00:00.000000 | 2002-09-04T00:00:00.000000 |
| certa-2002-ale-007 | Cédérom Pages Pro | 2002-09-04T00:00:00.000000 | 2002-09-04T00:00:00.000000 |
| CERTA-2003-ALE-001 | Vulnérabilité dans l'implémentation des logiciels de lecture des documents PDF | 2003-06-23T00:00:00.000000 | 2003-07-04T00:00:00.000000 |
| certa-2003-ale-001 | Vulnérabilité dans l'implémentation des logiciels de lecture des documents PDF | 2003-06-23T00:00:00.000000 | 2003-07-04T00:00:00.000000 |
| CERTA-2003-ALE-002 | Exploitation d'une faille de Windows RPC | 2003-08-01T00:00:00.000000 | 2003-08-19T00:00:00.000000 |
| certa-2003-ale-002 | Exploitation d'une faille de Windows RPC | 2003-08-01T00:00:00.000000 | 2003-08-19T00:00:00.000000 |
| CERTA-2003-ALE-003 | Exploitation massive de la vulnérabilité « include PHP » | 2003-09-09T00:00:00.000000 | 2003-09-09T00:00:00.000000 |
| certa-2003-ale-003 | Exploitation massive de la vulnérabilité « include PHP » | 2003-09-09T00:00:00.000000 | 2003-09-09T00:00:00.000000 |
| CERTA-2003-ALE-005 | Vulnérabilité de sadmind sur Solaris | 2003-09-19T00:00:00.000000 | 2003-09-19T00:00:00.000000 |
| certa-2003-ale-005 | Vulnérabilité de sadmind sur Solaris | 2003-09-19T00:00:00.000000 | 2003-09-19T00:00:00.000000 |
| CERTA-2003-ALE-004 | Vulnérabilité d'Internet Explorer | 2003-09-10T00:00:00.000000 | 2003-10-06T00:00:00.000000 |
| certa-2003-ale-004 | Vulnérabilité d'Internet Explorer | 2003-09-10T00:00:00.000000 | 2003-10-06T00:00:00.000000 |
| CERTA-2004-ALE-001 | Obstacles à la résolution d'incidents | 2004-01-30T00:00:00.000000 | 2004-01-30T00:00:00.000000 |
| certa-2004-ale-001 | Obstacles à la résolution d'incidents | 2004-01-30T00:00:00.000000 | 2004-01-30T00:00:00.000000 |