Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-1999-0649 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The FSP service is running. | N/A | N/A | 2000-02-04T05:00:00 | 2005-11-02T10:00:00 |
| CVE-1999-0652 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A database service is running, e.g. a SQL server, Oracle, or mySQL. | N/A | N/A | 2000-02-04T05:00:00 | 2005-11-02T10:00:00 |
| CVE-2003-1147 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0955. Reason: This candidate is a duplicate of CVE-2003-0955. Notes: All CVE users should reference CVE-2003-0955 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-05-10T04:00:00 | 2005-11-02T10:00:00 |
| CVE-2005-0389 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-0814. Reason: This candidate is a duplicate of CVE-2005-0814. Notes: All CVE users should reference CVE-2005-0814 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-03-23T05:00:00 | 2005-11-02T10:00:00 |
| CVE-2005-0714 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-0340. Reason: This candidate is a reservation duplicate of CVE-2005-0340. Notes: All CVE users should reference CVE-2005-0340 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-03-12T05:00:00 | 2005-11-02T10:00:00 |
| CVE-2005-0727 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-0735. Reason: This candidate is a duplicate of CVE-2005-0735. Notes: All CVE users should reference CVE-2005-0727 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-03-12T05:00:00 | 2005-11-02T10:00:00 |
| CVE-2005-0728 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-0736. Reason: This candidate is a duplicate of CVE-2005-0736. Notes: All CVE users should reference CVE-2005-0736 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-03-12T05:00:00 | 2005-11-02T10:00:00 |
| CVE-2005-0840 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-0706. Reason: This candidate is a duplicate of CVE-2005-0706. Notes: All CVE users should reference CVE-2005-0706 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-03-23T05:00:00 | 2005-11-02T10:00:00 |
| CVE-2005-0940 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-0490. Reason: This candidate was inadvertently referenced in a vendor advisory due to a typo. Notes: All CVE users should reference CVE-2005-0490 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-02-28T05:00:00 | 2005-11-02T10:00:00 |
| CVE-2005-1044 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-0941. Reason: This candidate is a duplicate of CVE-2005-0941. Notes: All CVE users should reference CVE-2005-0941 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-04-12T04:00:00 | 2005-11-02T10:00:00 |
| CVE-2005-1271 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-1343. Reason: This candidate is a reservation duplicate of CVE-2005-1343. Notes: All CVE users should reference CVE-2005-1343 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-05-12T04:00:00 | 2005-11-02T10:00:00 |
| CVE-2005-1277 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-1766. Reason: This candidate is a duplicate of CVE-2005-1766. Notes: This duplicate occurred due to insufficient coordination across three separate parties. All CVE users should reference CVE-2005-1766 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-06-26T04:00:00 | 2005-11-02T10:00:00 |
| CVE-2005-1334 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-1579. Reason: This candidate is a duplicate of CVE-2005-1579. Notes: All CVE users should reference CVE-2005-1579 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-06-03T04:00:00 | 2005-11-02T10:00:00 |
| CVE-2005-1690 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-1250. Reason: This candidate is a duplicate of CVE-2005-1250. Notes: this duplicate occurred as a result of multiple independent discoveries and insufficient coordination by the vendor and CNA. All CVE users should reference CVE-2005-1250 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-06-29T04:00:00 | 2005-11-02T10:00:00 |
| CVE-2005-1912 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-1841. Reason: This candidate is a duplicate of CVE-2005-1841. Notes: this duplicate occurred as a result of separate assignments by multiple CNAs, one to the researcher and one to the vendor. All CVE users should reference CVE-2005-1841 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-07-07T04:00:00 | 2005-11-02T10:00:00 |
| CVE-2005-1938 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-1250. Reason: This candidate is a duplicate of CVE-2005-1250. Notes: this duplicate occurred as a result of multiple independent discoveries and insufficient coordination by the vendor and CNA. All CVE users should reference CVE-2005-1250 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-06-29T04:00:00 | 2005-11-02T10:00:00 |
| CVE-2005-2355 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2335, CVE-2005-2356. Reason: due to a typo in an advisory, this candidate was accidentally referenced. Notes: All CVE users should consult CVE-2005-2335 and CVE-2005-2356 to determine the appropriate identifier for the issue | N/A | N/A | 2005-07-25T04:00:00 | 2005-11-02T10:00:00 |
| CVE-2005-2446 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2369. Reason: This candidate is a duplicate of CVE-2005-2369. Notes: All CVE users should reference CVE-2005-2369 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-08-03T04:00:00 | 2005-11-02T10:00:00 |
| CVE-2005-2447 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2370. Reason: This candidate is a duplicate of CVE-2005-2370. Notes: All CVE users should reference CVE-2005-2370 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-08-03T04:00:00 | 2005-11-02T10:00:00 |
| CVE-2005-2497 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2641. Reason: This candidate is a duplicate of CVE-2005-2641. Notes: All CVE users should reference CVE-2005-2641 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-10-07T04:00:00 | 2005-11-02T10:00:00 |
| CVE-2005-2578 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2552. Reason: This candidate is a duplicate of CVE-2005-2552. Notes: All CVE users should reference CVE-2005-2552 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-08-16T04:00:00 | 2005-11-02T10:00:00 |
| CVE-2005-2671 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2041. Reason: This candidate is a duplicate of CVE-2005-2041. Notes: All CVE users should reference CVE-2005-2041 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-08-23T04:00:00 | 2005-11-02T10:00:00 |
| CVE-2005-2913 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2799. Reason: This candidate is a duplicate of CVE-2005-2799. Notes: All CVE users should reference CVE-2005-2799 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-09-14T04:00:00 | 2005-11-02T10:00:00 |
| CVE-2005-3028 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2986. Reason: This candidate is a duplicate of CVE-2005-2986. Notes: All CVE users should reference CVE-2005-2986 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-09-21T04:00:00 | 2005-11-02T10:00:00 |
| CVE-2005-3117 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-3150. Reason: This candidate was privately assigned by a CNA to an issue, but the issue was published through separate channels and assigned a new identifier by the MITRE CNA, so it is a duplicate of CVE-2005-3150. Notes: All CVE users should reference CVE-2005-3150 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-10-06T04:00:00 | 2005-11-02T10:00:00 |
| CVE-2005-3162 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-3160. Reason: this candidate is a duplicate of CVE-2005-3160. Notes: All CVE users should reference CVE-2005-3160 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-10-06T04:00:00 | 2005-11-02T10:00:00 |
| CVE-2005-2965 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-4802, CVE-2005-4803. Reason: this candidate was intended for one issue, but the description and references inadvertently combined multiple issues. Notes: All CVE users should consult CVE-2005-4802 and CVE-2005-4803 to determine which ID is appropriate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-10-11T04:00:00 | 2005-11-04T10:00:00 |
| CVE-2005-3122 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-3424, CVE-2005-3425. Reason: this candidate was intended for one issue, but two different authoritative sources used it for two distinct issues. Notes: All CVE users should consult CVE-2005-3424 and CVE-2005-3425 to determine which ID is appropriate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-10-30T20:00:00 | 2005-11-04T10:00:00 |
| CVE-2005-2937 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-3663, CVE-2005-3664. Reason: this candidate was intended for one issue, but multiple advisories used this candidate for different issues. Notes: All CVE users should consult CVE-2005-3663 and CVE-2005-3664 to determine which ID is appropriate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-10-11T04:00:00 | 2005-11-18T10:00:00 |
| CVE-2005-3542 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-3508. Reason: This candidate is a reservation duplicate of CVE-2005-3508. Notes: All CVE users should reference CVE-2005-3508 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-11-16T07:37:00 | 2005-11-22T10:00:00 |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2002-2135 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1618. Reason: This candidate is a duplicate of CVE-2002-1618. Notes: All CVE users should reference CVE-2002-1618 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-11-16T21:17:00 | 2007-10-18T09:00:00 |
| CVE-2002-2136 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1590. Reason: This candidate is a duplicate of CVE-2002-1590. Notes: All CVE users should reference CVE-2002-1590 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-11-16T21:17:00 | 2007-10-18T09:00:00 |
| CVE-2002-2147 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1828. Reason: This candidate is a duplicate of CVE-2002-1828. Notes: All CVE users should reference CVE-2002-1828 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-11-16T21:17:00 | 2007-10-18T09:00:00 |
| CVE-2002-2151 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1651. Reason: This candidate is a duplicate of CVE-2002-1651. Notes: All CVE users should reference CVE-2002-1651 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-11-16T21:17:00 | 2007-10-18T09:00:00 |
| CVE-2002-2157 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1660. Reason: This candidate is a duplicate of CVE-2002-1660. Notes: All CVE users should reference CVE-2002-1660 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-11-16T21:17:00 | 2007-10-18T09:00:00 |
| CVE-2002-2160 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1798. Reason: This candidate is a duplicate of CVE-2002-1798. Notes: All CVE users should reference CVE-2002-1798 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-11-16T21:17:00 | 2007-10-18T09:00:00 |
| CVE-2002-2194 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1589. Reason: This candidate is a duplicate of CVE-2002-1589. Notes: All CVE users should reference CVE-2002-1589 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-11-16T21:17:00 | 2007-10-18T09:00:00 |
| CVE-2002-2440 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none | N/A | N/A | 2020-11-05T19:49:17 | 2020-11-05T19:49:17 |
| CVE-2002-2441 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none | N/A | N/A | 2020-11-05T19:49:42 | 2020-11-05T19:49:42 |
| CVE-2002-2442 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none | N/A | N/A | 2020-11-05T19:50:09 | 2020-11-05T19:50:09 |
| CVE-2003-0090 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2000-0844. Reason: This candidate is a duplicate of CVE-2000-0844. Notes: All CVE users should reference CVE-2000-0844 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2003-11-18T05:00:00 | 2003-11-21T10:00:00 |
| CVE-2003-0157 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0138. Reason: This candidate is a reservation duplicate of CVE-2003-0138 due to incomplete coordination. Notes: All CVE users should reference CVE-2003-0138 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2003-03-21T05:00:00 | 2005-02-06T10:00:00 |
| CVE-2003-0158 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0139. Reason: This candidate is a reservation duplicate of CVE-2003-0139 due to incomplete coordination. Notes: All CVE users should reference CVE-2003-0139 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2003-03-21T05:00:00 | 2005-02-06T10:00:00 |
| CVE-2003-0199 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2003. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2003-0200 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2003. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2003-0351 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0306. Reason: This candidate is a reservation duplicate of CVE-2003-0306. Notes: All CVE users should reference CVE-2003-0306 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2004-08-20T04:00:00 | 2004-08-20T09:00:00 |
| CVE-2003-0439 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2003. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2003-0463 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none | N/A | N/A | 2006-02-08T01:00:00Z | 2024-09-16T23:20:40.229Z |
| CVE-2003-0568 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2003. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2003-0569 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2003. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2003-0570 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2003. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2003-0571 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2003. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2003-0582 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0504. Reason: This candidate is a duplicate of CVE-2003-0504. Notes: All CVE users should reference CVE-2003-0504 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2003-07-25T04:00:00 | 2003-07-25T09:00:00 |
| CVE-2003-0591 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is a duplicate number that was created during the refinement phase. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2003-07-25T04:00:00 | 2005-02-06T10:00:00 |
| CVE-2003-0598 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0657. Reason: This candidate is a reservation duplicate of CVE-2003-0657. Notes: All CVE users should reference CVE-2003-0657 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2003-08-14T04:00:00 | 2004-08-20T09:00:00 |
| CVE-2003-0678 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2003. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2003-0684 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2003. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2003-0687 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate has been revoked by its Candidate Numbering Authority (CNA) because it was internally assigned to a problem that was not reachable (the affected routine was not used by the software). Notes: none | N/A | N/A | 2004-06-03T04:00:00 | 2005-02-06T10:00:00 |
| CVE-2003-0691 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not associated with any specific security issue. Notes: none | N/A | N/A | 2006-02-27T23:00:00Z | 2024-09-16T22:25:23.087Z |
| CVE-2003-0698 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0743. Reason: This candidate is a duplicate of CVE-2003-0743. Notes: All CVE users should reference CVE-2003-0743 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-04-14T04:00:00 | 2005-06-02T09:00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2002-2135 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1618. Reason: This candid… | 2002-12-31T05:00:00.000 | 2023-11-07T01:56:09.257 |
| fkie_cve-2002-2136 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1590. Reason: This candid… | 2002-12-31T05:00:00.000 | 2023-11-07T01:56:09.297 |
| fkie_cve-2002-2147 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1828. Reason: This candid… | 2002-12-31T05:00:00.000 | 2023-11-07T01:56:09.403 |
| fkie_cve-2002-2151 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1651. Reason: This candid… | 2002-12-31T05:00:00.000 | 2023-11-07T01:56:09.457 |
| fkie_cve-2002-2157 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1660. Reason: This candid… | 2002-12-31T05:00:00.000 | 2023-11-07T01:56:09.520 |
| fkie_cve-2002-2160 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1798. Reason: This candid… | 2002-12-31T05:00:00.000 | 2023-11-07T01:56:09.580 |
| fkie_cve-2002-2194 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1589. Reason: This candid… | 2002-12-31T05:00:00.000 | 2023-11-07T01:56:09.847 |
| fkie_cve-2002-2440 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:13.647 | 2023-11-07T01:56:11.690 |
| fkie_cve-2002-2441 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:13.723 | 2023-11-07T01:56:11.903 |
| fkie_cve-2002-2442 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:13.817 | 2023-11-07T01:56:12.113 |
| fkie_cve-2003-0090 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2000-0844. Reason: This candid… | 2003-12-15T05:00:00.000 | 2023-11-07T01:56:13.590 |
| fkie_cve-2003-0157 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0138. Reason: This candid… | 2003-03-24T05:00:00.000 | 2023-11-07T01:56:14.440 |
| fkie_cve-2003-0158 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0139. Reason: This candid… | 2003-03-24T05:00:00.000 | 2023-11-07T01:56:14.473 |
| fkie_cve-2003-0199 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.777 | 2023-11-07T01:56:15.040 |
| fkie_cve-2003-0200 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.807 | 2023-11-07T01:56:15.257 |
| fkie_cve-2003-0351 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0306. Reason: This candid… | 2003-12-31T05:00:00.000 | 2023-11-07T01:56:16.783 |
| fkie_cve-2003-0439 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.837 | 2023-11-07T01:56:17.367 |
| fkie_cve-2003-0463 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was w… | 2003-12-31T05:00:00.000 | 2023-11-07T01:56:17.870 |
| fkie_cve-2003-0568 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.853 | 2023-11-07T01:56:18.793 |
| fkie_cve-2003-0569 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.887 | 2023-11-07T01:56:19.007 |
| fkie_cve-2003-0570 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.900 | 2023-11-07T01:56:19.217 |
| fkie_cve-2003-0571 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.933 | 2023-11-07T01:56:19.427 |
| fkie_cve-2003-0582 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0504. Reason: This candid… | 2003-12-31T05:00:00.000 | 2023-11-07T01:56:19.753 |
| fkie_cve-2003-0591 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is a … | 2003-08-27T04:00:00.000 | 2023-11-07T01:56:19.833 |
| fkie_cve-2003-0598 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0657. Reason: This candid… | 2003-08-27T04:00:00.000 | 2023-11-07T01:56:19.903 |
| fkie_cve-2003-0678 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.963 | 2023-11-07T01:56:20.467 |
| fkie_cve-2003-0684 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.980 | 2023-11-07T01:56:20.740 |
| fkie_cve-2003-0687 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate has b… | 2004-08-18T04:00:00.000 | 2023-11-07T01:56:20.970 |
| fkie_cve-2003-0691 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was w… | 2003-12-31T05:00:00.000 | 2023-11-07T01:56:21.030 |
| fkie_cve-2003-0698 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0743. Reason: This candid… | 2003-12-31T05:00:00.000 | 2023-11-07T01:56:21.120 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-2mhh-w6q8-5hxw |
|
Remote Memory Disclosure in ws | 2019-02-18T23:56:42Z | 2020-08-31T18:09:55Z |
| ghsa-77g4-36jp-5v3m |
|
Remote Memory Disclosure in bittorrent-dht | 2020-09-01T15:22:12Z | 2020-08-31T18:09:58Z |
| ghsa-vgrx-w6rg-8fqf |
|
Forgeable Public/Private Tokens in jwt-simple | 2018-11-06T23:12:07Z | 2020-08-31T18:10:20Z |
| ghsa-xg5r-8j97-2wrj |
|
Directory Traversal in restafary | 2019-02-18T23:39:22Z | 2020-08-31T18:10:25Z |
| ghsa-rhvc-x32h-5526 |
|
No CSRF Validation in droppy | 2019-02-18T23:39:32Z | 2020-08-31T18:10:30Z |
| ghsa-cgjx-mwpx-47jv |
|
Private Data Disclosure in express-restify-mongoose | 2018-10-23T17:14:57Z | 2020-08-31T18:10:32Z |
| ghsa-hjhr-r3gq-qvp6 |
|
Timing Attack in csrf-lite | 2019-02-18T23:39:44Z | 2020-08-31T18:10:37Z |
| ghsa-6cpc-mj5c-m9rq |
|
Arbitrary File Write in cli | 2019-02-18T23:40:03Z | 2020-08-31T18:10:40Z |
| ghsa-856x-cp3q-47vg |
|
Insecure Default Configuration in airbrake | 2019-02-18T23:58:13Z | 2020-08-31T18:10:42Z |
| ghsa-m5h6-hr3q-22h5 |
|
npm Token Leak in npm | 2018-07-31T22:58:35Z | 2020-08-31T18:10:47Z |
| ghsa-7mc5-chhp-fmc3 |
|
Regular Expression Denial of Service in negotiator | 2018-10-09T00:30:30Z | 2020-08-31T18:11:01Z |
| ghsa-2v7q-2xqx-f4q5 |
|
Potential SQL Injection in sequelize | 2019-02-18T23:54:32Z | 2020-08-31T18:11:09Z |
| ghsa-98pq-pmw9-4gpm |
|
SQL Injection in sequelize | 2019-02-18T23:54:34Z | 2020-08-31T18:11:11Z |
| ghsa-x2jc-pwfj-h9p3 |
|
SQL Injection in sequelize | 2019-02-18T23:54:28Z | 2020-08-31T18:11:14Z |
| ghsa-cgpp-wm2h-6hqx |
|
SQL Injection in waterline-sequel | 2019-02-18T23:54:28Z | 2020-08-31T18:11:18Z |
| ghsa-2r5h-gh4x-8hp9 |
|
Resources Downloaded over Insecure Protocol in igniteui | 2019-02-18T23:40:14Z | 2020-08-31T18:11:21Z |
| ghsa-6663-c963-2gqg |
|
DoS due to excessively large websocket message in ws | 2019-02-18T23:58:35Z | 2020-08-31T18:11:28Z |
| ghsa-84fv-prrc-5ggr |
|
Route Validation Bypass in call | 2019-02-18T23:40:04Z | 2020-08-31T18:11:30Z |
| ghsa-cgqv-x5cx-xvqh |
|
Arbitrary Code Injection in pouchdb | 2018-07-26T16:22:08Z | 2020-08-31T18:12:18Z |
| ghsa-4662-j96g-mv46 |
|
Arbitrary Code Injection in reduce-css-calc | 2018-06-07T19:43:06Z | 2020-08-31T18:12:20Z |
| ghsa-f7ph-p5rv-phw2 |
|
Cross-Site Scripting in nunjucks | 2018-11-06T23:13:37Z | 2020-08-31T18:12:27Z |
| ghsa-hf5h-hh56-3vrg |
|
Denial of Service in uws | 2020-09-01T16:02:29Z | 2020-08-31T18:12:32Z |
| ghsa-g3xp-v2ff-x5c3 |
|
Downloads Resources over HTTP in go-ipfs-dep | 2019-02-18T23:54:18Z | 2020-08-31T18:12:48Z |
| ghsa-mm7h-323r-9p4g |
|
Downloads Resources over HTTP in imageoptim | 2019-02-18T23:50:33Z | 2020-08-31T18:14:15Z |
| ghsa-5g4r-87v2-jqvx |
|
Downloads Resources over HTTP in apk-parser | 2020-09-01T16:05:44Z | 2020-08-31T18:14:17Z |
| ghsa-2wrq-wmqf-8vcc |
|
Downloads Resources over HTTP in operadriver | 2019-02-18T23:35:48Z | 2020-08-31T18:14:19Z |
| ghsa-fwx5-5fqj-jv98 |
|
Cross-Site Scripting in morris.js | 2018-11-09T17:46:30Z | 2020-08-31T18:18:39Z |
| ghsa-26q7-g57v-mxcp |
|
HTML Injection in shout | 2018-11-07T00:28:11Z | 2020-08-31T18:19:13Z |
| ghsa-3pwh-5mmc-mwrx |
|
Denial of Service in nes | 2018-07-24T20:06:33Z | 2020-08-31T18:19:35Z |
| ghsa-mj87-8xf8-fp4w |
|
Cross-Site Scripting in yui | 2020-09-01T16:42:51Z | 2020-08-31T18:19:38Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2020-11 |
|
A flaw was found in Ansible 2.7.16 and prior, 2.8.8 and prior, and 2.9.5 and prior when a… | ansible | 2020-03-12T18:15:00Z | 2020-05-29T14:09:00Z |
| pysec-2020-6 |
|
A flaw was found in the pipe lookup plugin of ansible. Arbitrary commands can be run, whe… | ansible | 2020-03-03T22:15:00Z | 2020-05-29T14:11:00Z |
| pysec-2020-42 |
|
An issue was discovered in fastecdsa before 2.1.2. When using the NIST P-256 curve in the… | fastecdsa | 2020-06-02T21:15:00Z | 2020-06-03T13:47:00Z |
| pysec-2020-1 |
|
A flaw was found in Ansible Engine affecting Ansible Engine versions 2.7.x before 2.7.17 … | ansible | 2020-05-11T14:15:00Z | 2020-06-13T04:15:00Z |
| pysec-2020-10 |
|
A flaw was found in Ansible Engine when the module package or service is used and the par… | ansible | 2020-03-16T16:15:00Z | 2020-06-13T04:15:00Z |
| pysec-2020-12 |
|
A flaw was found in Ansible Engine when using Ansible Vault for editing encrypted files. … | ansible | 2020-03-16T16:15:00Z | 2020-06-13T04:15:00Z |
| pysec-2020-5 |
|
A race condition flaw was found in Ansible Engine 2.7.17 and prior, 2.8.9 and prior, 2.9.… | ansible | 2020-03-11T19:15:00Z | 2020-06-13T04:15:00Z |
| pysec-2020-7 |
|
A flaw was found in the Ansible Engine when the fetch module is used. An attacker could i… | ansible | 2020-03-16T16:15:00Z | 2020-06-13T04:15:00Z |
| pysec-2020-9 |
|
A flaw was found in Ansible 2.7.17 and prior, 2.8.9 and prior, and 2.9.6 and prior when u… | ansible | 2020-03-09T16:15:00Z | 2020-06-13T04:15:00Z |
| pysec-2020-35 |
|
Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3 allows SQL Injection … | django | 2020-02-03T12:15:00Z | 2020-06-19T03:15:00Z |
| pysec-2020-47 |
|
In Indy Node 1.12.2, there is an Uncontrolled Resource Consumption vulnerability. Indy No… | indy-node | 2020-06-11T00:15:00Z | 2020-06-22T16:36:00Z |
| pysec-2019-114 |
|
Prior to Spark 2.3.3, in certain situations Spark would write user data to local disk une… | pyspark | 2019-08-07T17:15:00Z | 2020-06-23T00:15:00Z |
| pysec-2020-112 |
|
Tendenci 12.0.10 allows unrestricted deserialization in apps\helpdesk\views\staff.py. | tendenci | 2020-06-21T15:15:00Z | 2020-06-26T19:34:00Z |
| pysec-2020-37 |
|
In django-basic-auth-ip-whitelist before 0.3.4, a potential timing attack exists on websi… | django-basic-auth-ip-whitelist | 2020-06-24T13:15:00Z | 2020-07-09T14:11:00Z |
| pysec-2020-82 |
|
libImaging/SgiRleDecode.c in Pillow before 6.2.2 has an SGI buffer overflow. | pillow | 2020-01-03T01:15:00Z | 2020-07-10T17:06:00Z |
| pysec-2020-83 |
|
libImaging/PcxDecode.c in Pillow before 6.2.2 has a PCX P mode buffer overflow. | pillow | 2020-01-03T01:15:00Z | 2020-07-10T17:09:00Z |
| pysec-2019-115 |
|
python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg to decrypt other cip… | python-gnupg | 2019-03-21T16:01:00Z | 2020-07-13T04:15:00Z |
| pysec-2020-63 |
|
OpenStack Manila <7.4.1, >=8.0.0 <8.1.1, and >=9.0.0 <9.1.1 allows attackers to view, upd… | manila | 2020-03-12T17:15:00Z | 2020-07-14T17:27:00Z |
| pysec-2020-36 |
|
Django 1.11 before 1.11.29, 2.2 before 2.2.11, and 3.0 before 3.0.4 allows SQL Injection … | django | 2020-03-05T15:15:00Z | 2020-07-14T17:28:00Z |
| pysec-2020-39 |
|
Django Two-Factor Authentication before 1.12, stores the user's password in clear text in… | django-two-factor-auth | 2020-07-10T21:15:00Z | 2020-07-21T18:06:00Z |
| pysec-2020-23 |
|
An issue was found in Apache Airflow versions 1.10.10 and below. A stored XSS vulnerabili… | apache-airflow | 2020-07-17T00:15:00Z | 2020-07-21T18:38:00Z |
| pysec-2020-17 |
|
An issue was found in Apache Airflow versions 1.10.10 and below. It was discovered that m… | apache-airflow | 2020-07-17T00:15:00Z | 2020-07-21T18:45:00Z |
| pysec-2020-14 |
|
An issue was found in Apache Airflow versions 1.10.10 and below. A remote code/command in… | apache-airflow | 2020-07-17T00:15:00Z | 2020-07-22T17:15:00Z |
| pysec-2020-51 |
|
In jupyterhub-kubespawner before 0.12, certain usernames will be able to craft particular… | jupyterhub-kubespawner | 2020-07-17T21:15:00Z | 2020-07-22T20:28:00Z |
| pysec-2020-15 |
|
An issue was found in Apache Airflow versions 1.10.10 and below. When using CeleryExecuto… | apache-airflow | 2020-07-17T00:15:00Z | 2020-07-24T18:19:00Z |
| pysec-2020-16 |
|
An issue was found in Apache Airflow versions 1.10.10 and below. When using CeleryExecuto… | apache-airflow | 2020-07-17T00:15:00Z | 2020-07-24T18:22:00Z |
| pysec-2019-117 |
|
ReportLab through 3.5.26 allows remote code execution because of toColor(eval(arg)) in co… | reportlab | 2019-10-16T12:15:00Z | 2020-07-27T03:15:00Z |
| pysec-2020-77 |
|
In libImaging/PcxDecode.c in Pillow before 7.1.0, an out-of-bounds read can occur when re… | pillow | 2020-06-25T19:15:00Z | 2020-07-27T19:15:00Z |
| pysec-2020-78 |
|
In Pillow before 7.1.0, there are two Buffer Overflows in libImaging/TiffDecode.c. | pillow | 2020-06-25T19:15:00Z | 2020-07-27T19:15:00Z |
| pysec-2020-79 |
|
In libImaging/Jpeg2KDecode.c in Pillow before 7.1.0, there are multiple out-of-bounds rea… | pillow | 2020-06-25T19:15:00Z | 2020-07-27T19:15:00Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2013-4562 | omniauth-facebook Gem for Ruby contains a flaw as HTTP requests do not require multiple s… | 2013-11-12T00:00:00.000Z |
| gsd-2013-4593 | omniauth-facebook Gem for Ruby contains a flaw that is due to the application supporting … | 2013-11-14T00:00:00.000Z |
| gsd-2013-6421 | sprout Gem for Ruby contains a flaw in the unpack_zip() function in archive_unpacker.rb. … | 2013-12-02T00:00:00.000Z |
| gsd-2013-4491 | There is a vulnerability in the internationalization component of Ruby on Rails. Under ce… | 2013-12-03T00:00:00.000Z |
| gsd-2013-4492 | The HTML exception message raised by I18n::MissingTranslation fails to escape the keys. | 2013-12-03T00:00:00.000Z |
| gsd-2013-6414 | There is a denial of service vulnerability in the header handling component of Action View. | 2013-12-03T00:00:00.000Z |
| gsd-2013-6415 | There is an XSS vulnerability in the number_to_currency helper in Ruby on Raile. The numb… | 2013-12-03T00:00:00.000Z |
| gsd-2013-6416 | There is a vulnerability in the simple_format helper in Ruby on Rails. The simple_format … | 2013-12-03T00:00:00.000Z |
| gsd-2013-6417 | The prior fix to CVE-2013-0155 was incomplete and the use of common 3rd party libraries c… | 2013-12-03T00:00:00.000Z |
| gsd-2013-7086 | Webbynode Gem for Ruby contains a flaw in notify.rb that is triggered when handling a spe… | 2013-12-12T00:00:00.000Z |
| gsd-2013-6460 | Nokogiri gem 1.5.x has Denial of Service via infinite loop when parsing XML documents | 2013-12-14T00:00:00.000Z |
| gsd-2013-6461 | Nokogiri gem 1.5.x and 1.6.x has DoS while parsing XML entities by failing to apply limits | 2013-12-14T00:00:00.000Z |
| gsd-2013-7111 | Bio Basespace SDK Gem for Ruby contains a flaw that is due to the API client code passing… | 2013-12-14T00:00:00.000Z |
| gsd-2013-7222 | Fat Free CRM contains a flaw that is due to the application defining a static security se… | 2013-12-24T00:00:00.000Z |
| gsd-2013-7223 | Fat Free CRM contains a flaw as the application is missing the protect_from_forgery state… | 2013-12-24T00:00:00.000Z |
| gsd-2013-7224 | Fat Free CRM contains a flaw in user controllers that is triggered as JSON requests are r… | 2013-12-24T00:00:00.000Z |
| gsd-2013-7225 | Fat Free CRM contains a flaw that may allow carrying out an SQL injection attack. The iss… | 2013-12-24T00:00:00.000Z |
| gsd-2013-7249 | Fat Free CRM contains a flaw that is triggered when the attacker sends a direct request f… | 2013-12-24T00:00:00.000Z |
| gsd-2014-1233 | paratrooper-pingdom Gem for Ruby contains a flaw in /lib/paratrooper-pingdom.rb. The issu… | 2013-12-26T00:00:00.000Z |
| gsd-2014-1234 | Paratrooper-newrelic Gem for Ruby contains a flaw in /lib/paratrooper-newrelic.rb. The is… | 2014-01-08T00:00:00.000Z |
| gsd-2014-0013 | In general, Ember.js escapes or strips any user-supplied content before inserting it in s… | 2014-01-14T00:00:00.000Z |
| gsd-2014-0014 | In general, Ember.js escapes or strips any user-supplied content before inserting it in s… | 2014-01-14T00:00:00.000Z |
| gsd-2014-1834 | Echor Gem for Ruby contains a flaw in backplane.rb in the perform_request function that i… | 2014-01-14T00:00:00.000Z |
| gsd-2014-1835 | echor Gem for Ruby contains a flaw that is due to the program exposing credential informa… | 2014-01-14T00:00:00.000Z |
| gsd-2014-1831 | Phusion Passenger before 4.0.37 allows local users to write to certain files and director… | 2014-01-28T00:00:00.000Z |
| gsd-2014-1832 | Phusion Passenger 4.0.37 allows local users to write to certain files and directories via… | 2014-01-29T00:00:00.000Z |
| gsd-2014-0046 | In general, Ember.js escapes or strips any user-supplied content before inserting it in s… | 2014-02-07T00:00:00.000Z |
| gsd-2014-0083 | The Ruby net-ldap gem before 0.11 uses a weak salt when generating SSHA passwords. | 2014-02-13T00:00:00.000Z |
| gsd-2014-0080 | SQL injection vulnerability in activerecord/lib/active_record/connection_adapters/postgre… | 2014-02-18T00:00:00.000Z |
| gsd-2014-0081 | Multiple cross-site scripting (XSS) vulnerabilities in actionview/lib/action_view/helpers… | 2014-02-18T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| MAL-2022-1040 | Malicious code in api-extractor-test-01 (npm) | 2022-05-16T07:27:01Z | 2022-05-16T07:27:01Z |
| mal-2022-1040 | Malicious code in api-extractor-test-01 (npm) | 2022-05-16T07:27:01Z | 2022-05-16T07:27:01Z |
| MAL-2022-5577 | Malicious code in rainbow-bridge-testing (npm) | 2022-05-16T07:27:01Z | 2022-05-16T07:27:02Z |
| mal-2022-5577 | Malicious code in rainbow-bridge-testing (npm) | 2022-05-16T07:27:01Z | 2022-05-16T07:27:02Z |
| MAL-2022-4264 | Malicious code in lbc-git (npm) | 2022-05-16T07:31:48Z | 2022-05-16T07:31:49Z |
| mal-2022-4264 | Malicious code in lbc-git (npm) | 2022-05-16T07:31:48Z | 2022-05-16T07:31:49Z |
| MAL-2022-1823 | Malicious code in cap-common-pages (npm) | 2022-05-16T07:40:54Z | 2022-05-16T07:40:54Z |
| MAL-2022-1824 | Malicious code in cap-products (npm) | 2022-05-16T07:40:54Z | 2022-05-16T07:40:54Z |
| MAL-2022-1990 | Malicious code in coldstone-helpers (npm) | 2022-05-16T07:40:54Z | 2022-05-16T07:40:54Z |
| MAL-2022-1991 | Malicious code in coldstone-sls (npm) | 2022-05-16T07:40:54Z | 2022-05-16T07:40:54Z |
| mal-2022-1823 | Malicious code in cap-common-pages (npm) | 2022-05-16T07:40:54Z | 2022-05-16T07:40:54Z |
| mal-2022-1824 | Malicious code in cap-products (npm) | 2022-05-16T07:40:54Z | 2022-05-16T07:40:54Z |
| mal-2022-1990 | Malicious code in coldstone-helpers (npm) | 2022-05-16T07:40:54Z | 2022-05-16T07:40:54Z |
| mal-2022-1991 | Malicious code in coldstone-sls (npm) | 2022-05-16T07:40:54Z | 2022-05-16T07:40:54Z |
| MAL-2022-1645 | Malicious code in bolt-styles (npm) | 2022-05-16T07:40:54Z | 2022-05-16T07:41:01Z |
| mal-2022-1645 | Malicious code in bolt-styles (npm) | 2022-05-16T07:40:54Z | 2022-05-16T07:41:01Z |
| MAL-2022-1142 | Malicious code in assets-common (npm) | 2022-05-16T07:40:54Z | 2022-05-16T07:41:02Z |
| MAL-2022-4291 | Malicious code in lexical-website-new (npm) | 2022-05-16T07:40:54Z | 2022-05-16T07:41:02Z |
| mal-2022-1142 | Malicious code in assets-common (npm) | 2022-05-16T07:40:54Z | 2022-05-16T07:41:02Z |
| mal-2022-4291 | Malicious code in lexical-website-new (npm) | 2022-05-16T07:40:54Z | 2022-05-16T07:41:02Z |
| MAL-2022-2826 | Malicious code in eslint-plugin-seller-ui-eslint-plugin (npm) | 2022-05-17T05:53:39Z | 2022-05-17T05:53:49Z |
| MAL-2022-579 | Malicious code in @seller-ui/products (npm) | 2022-05-17T05:53:38Z | 2022-05-17T05:53:49Z |
| MAL-2022-580 | Malicious code in @seller-ui/settings (npm) | 2022-05-17T05:53:39Z | 2022-05-17T05:53:49Z |
| mal-2022-2826 | Malicious code in eslint-plugin-seller-ui-eslint-plugin (npm) | 2022-05-17T05:53:39Z | 2022-05-17T05:53:49Z |
| mal-2022-579 | Malicious code in @seller-ui/products (npm) | 2022-05-17T05:53:38Z | 2022-05-17T05:53:49Z |
| mal-2022-580 | Malicious code in @seller-ui/settings (npm) | 2022-05-17T05:53:39Z | 2022-05-17T05:53:49Z |
| MAL-2022-7036 | Malicious code in wakakaa (npm) | 2022-05-17T06:28:02Z | 2022-05-17T06:28:03Z |
| MAL-2022-7278 | Malicious code in xiawaa (npm) | 2022-05-17T06:28:02Z | 2022-05-17T06:28:03Z |
| MAL-2022-7306 | Malicious code in yadanga (npm) | 2022-05-17T06:28:02Z | 2022-05-17T06:28:03Z |
| MAL-2022-940 | Malicious code in alimaa (npm) | 2022-05-17T06:28:02Z | 2022-05-17T06:28:03Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2022-2292 | Wireshark: Schwachstelle ermöglicht Denial of Service | 2022-12-12T23:00:00.000+00:00 | 2022-12-12T23:00:00.000+00:00 |
| wid-sec-w-2022-2294 | Siemens SIPROTEC: Mehrere Schwachstellen ermöglichen Denial of Service | 2022-12-12T23:00:00.000+00:00 | 2022-12-12T23:00:00.000+00:00 |
| wid-sec-w-2022-2295 | Siemens SIMATIC WinCC: Schwachstelle ermöglicht Codeausführung | 2022-12-12T23:00:00.000+00:00 | 2022-12-12T23:00:00.000+00:00 |
| wid-sec-w-2022-2296 | Siemens JT2Go: Mehrere Schwachstellen | 2022-12-12T23:00:00.000+00:00 | 2022-12-12T23:00:00.000+00:00 |
| wid-sec-w-2022-2297 | Siemens SIMATIC S7: Mehrere Schwachstellen ermöglichen Denial of Service | 2022-12-12T23:00:00.000+00:00 | 2022-12-12T23:00:00.000+00:00 |
| wid-sec-w-2022-2298 | TYPO3 Extension: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2022-12-12T23:00:00.000+00:00 | 2022-12-12T23:00:00.000+00:00 |
| wid-sec-w-2022-2299 | TYPO3 Core: Mehrere Schwachstellen | 2022-12-12T23:00:00.000+00:00 | 2022-12-12T23:00:00.000+00:00 |
| wid-sec-w-2022-0454 | Red Hat Directory Server: Schwachstelle ermöglicht Denial of Service | 2022-05-11T22:00:00.000+00:00 | 2022-12-13T23:00:00.000+00:00 |
| wid-sec-w-2022-0500 | Red Hat Directory Server: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2022-06-28T22:00:00.000+00:00 | 2022-12-13T23:00:00.000+00:00 |
| wid-sec-w-2022-2184 | Unify OpenScape 4000: Schwachstelle ermöglicht Erlangen von Administratorrechten | 2022-11-27T23:00:00.000+00:00 | 2022-12-13T23:00:00.000+00:00 |
| wid-sec-w-2022-2300 | Adobe Creative Cloud Illustrator: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2022-12-13T23:00:00.000+00:00 | 2022-12-13T23:00:00.000+00:00 |
| wid-sec-w-2022-2305 | Microsoft Office Mehrere Schwachstellen | 2022-12-13T23:00:00.000+00:00 | 2022-12-13T23:00:00.000+00:00 |
| wid-sec-w-2022-2306 | Microsoft Dynamics: Schwachstelle ermöglichen Codeausführung | 2022-12-13T23:00:00.000+00:00 | 2022-12-13T23:00:00.000+00:00 |
| wid-sec-w-2022-2307 | Microsoft Developer Tools: Mehrere Schwachstellen | 2022-12-13T23:00:00.000+00:00 | 2022-12-13T23:00:00.000+00:00 |
| wid-sec-w-2022-2308 | Microsoft Windows Azure: Schwachstellee ermöglicht Umgehen von Sicherheitsvorkehrungen | 2022-12-13T23:00:00.000+00:00 | 2022-12-13T23:00:00.000+00:00 |
| wid-sec-w-2022-2309 | Microsoft Apps: Mehrere Schwachstellen | 2022-12-13T23:00:00.000+00:00 | 2022-12-13T23:00:00.000+00:00 |
| wid-sec-w-2022-2311 | Aruba EdgeConnect Orchestrator: Mehrere Schwachstellen | 2022-12-13T23:00:00.000+00:00 | 2022-12-13T23:00:00.000+00:00 |
| wid-sec-w-2022-2314 | Apple Safari: Mehrere Schwachstellen | 2022-12-13T23:00:00.000+00:00 | 2022-12-13T23:00:00.000+00:00 |
| wid-sec-w-2022-2317 | Citrix Systems ADC: Schwachstelle ermöglicht Codeausführung | 2022-12-13T23:00:00.000+00:00 | 2022-12-13T23:00:00.000+00:00 |
| wid-sec-w-2022-2320 | VMware Products: Mehrere Schwachstellen | 2022-12-13T23:00:00.000+00:00 | 2022-12-13T23:00:00.000+00:00 |
| wid-sec-w-2022-2325 | Veeam Backup & Replication: Mehrere Schwachstellen | 2022-03-13T23:00:00.000+00:00 | 2022-12-14T23:00:00.000+00:00 |
| wid-sec-w-2022-2326 | Intel Graphics Driver: Mehrere Schwachstellen | 2021-11-09T23:00:00.000+00:00 | 2022-12-14T23:00:00.000+00:00 |
| wid-sec-w-2022-2327 | Intel BIOS: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2021-11-09T23:00:00.000+00:00 | 2022-12-14T23:00:00.000+00:00 |
| wid-sec-w-2022-2329 | AMD Prozessoren und Chipsätze: Schwachstelle ermöglicht Offenlegung von Informationen | 2021-09-14T22:00:00.000+00:00 | 2022-12-14T23:00:00.000+00:00 |
| wid-sec-w-2022-2331 | IBM Spectrum Protect: Schwachstelle ermöglicht Offenlegung von Informationen | 2022-12-14T23:00:00.000+00:00 | 2022-12-14T23:00:00.000+00:00 |
| wid-sec-w-2022-2332 | D-LINK Router: Schwachstelle ermöglicht Command-Injection | 2022-12-14T23:00:00.000+00:00 | 2022-12-14T23:00:00.000+00:00 |
| wid-sec-w-2022-2333 | Icinga: Mehrere Schwachstellen | 2022-12-14T23:00:00.000+00:00 | 2022-12-14T23:00:00.000+00:00 |
| wid-sec-w-2022-2336 | Drupal: Mehrere Schwachstellen | 2022-12-14T23:00:00.000+00:00 | 2022-12-14T23:00:00.000+00:00 |
| wid-sec-w-2022-2337 | Zabbix: Schwachstelle ermöglicht Offenlegung von Informationen | 2022-12-14T23:00:00.000+00:00 | 2022-12-14T23:00:00.000+00:00 |
| wid-sec-w-2022-2340 | Nvidia Treiber: Mehrere Schwachstellen | 2021-04-26T22:00:00.000+00:00 | 2022-12-14T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2024-0309 | Kwetsbaarheid gevonden in Ivanti Endpoint Manager | 2024-07-18T12:00:25.689314Z | 2024-07-18T12:00:25.689314Z |
| ncsc-2024-0310 | Kwetsbaarheid verholpen in SonicOS | 2024-07-18T12:25:06.813302Z | 2024-07-18T12:25:06.813302Z |
| ncsc-2024-0311 | Kwetsbaarheden verholpen in Cisco Secure Email Gateway | 2024-07-18T12:46:34.019785Z | 2024-07-18T12:46:34.019785Z |
| ncsc-2024-0312 | Kwetsbaarheden verholpen in Solarwinds Platform | 2024-07-18T13:23:55.561789Z | 2024-07-18T13:23:55.561789Z |
| ncsc-2024-0313 | Kwetsbaarheid verholpen in HPE 3PAR Service Processor | 2024-07-18T13:58:07.127103Z | 2024-07-18T13:58:07.127103Z |
| ncsc-2024-0314 | Kwetsbaarheden verholpen in Apache HTTP Server | 2024-07-19T07:34:12.997118Z | 2024-07-19T07:34:12.997118Z |
| ncsc-2024-0315 | Kwetsbaarheid verholpen in Cisco Smart Software Manager On-Prem | 2024-07-19T13:06:00.004663Z | 2024-07-19T13:06:00.004663Z |
| ncsc-2024-0316 | Kwetsbaarheid verholpen in Broadcom Symantec Privileged Access Management | 2024-07-22T09:17:29.853486Z | 2024-07-22T09:17:29.853486Z |
| ncsc-2024-0317 | Kwetsbaarheid gevonden in Ivanti Endpoint Manager | 2024-07-24T14:37:09.864241Z | 2024-07-24T14:37:09.864241Z |
| ncsc-2024-0318 | Kwetsbaarheden verholpen in Docker Moby | 2024-07-25T11:28:37.900721Z | 2024-07-25T11:28:37.900721Z |
| ncsc-2024-0319 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2024-07-30T08:39:16.399394Z | 2024-07-30T08:39:16.399394Z |
| ncsc-2024-0320 | Kwetsbaarheden verholpen in Apple MacOS | 2024-07-30T08:42:07.365674Z | 2024-07-30T08:42:07.365674Z |
| ncsc-2024-0321 | Kwetsbaarheid verholpen in Progress MOVEit Transfer | 2024-07-30T08:45:50.286085Z | 2024-07-30T08:45:50.286085Z |
| ncsc-2024-0269 | Kwetsbaarheden verholpen in VMware ESXi en vCenter Server | 2024-06-26T09:02:10.988453Z | 2024-07-30T09:32:13.311694Z |
| ncsc-2024-0322 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2024-08-06T09:25:08.253832Z | 2024-08-06T09:25:08.253832Z |
| ncsc-2024-0323 | Kwetsbaarheden verholpen in Siemens Omnivise | 2024-08-06T09:29:53.292433Z | 2024-08-06T09:29:53.292433Z |
| ncsc-2024-0324 | Kwetsbaarheden verholpen in Mozilla Firefox en Thunderbird | 2024-08-07T08:58:12.457235Z | 2024-08-07T08:58:12.457235Z |
| ncsc-2024-0325 | Kwetsbaarheden verholpen in Aruba Networks ArubaOS en InstantOS | 2024-08-07T09:04:14.955844Z | 2024-08-07T09:04:14.955844Z |
| ncsc-2024-0326 | Kwetsbaarheden verholpen in RoundCube Webmail | 2024-08-08T07:45:42.674316Z | 2024-08-08T07:45:42.674316Z |
| ncsc-2024-0268 | Kwetsbaarheden verholpen in Progress WhatsUp Gold | 2024-06-26T07:43:11.795773Z | 2024-08-08T07:50:41.453544Z |
| ncsc-2024-0327 | Kwetsbaarheden verholpen in Cisco Small Business IP Phones | 2024-08-08T08:01:30.827296Z | 2024-08-08T08:01:30.827296Z |
| ncsc-2024-0328 | Kwetsbaarheden verholpen in IBM InfoSphere | 2024-08-12T08:22:38.701674Z | 2024-08-12T08:22:38.701674Z |
| ncsc-2024-0329 | Kwetsbaarheden verholpen in GitLab Enterprise Edition en Community Edition | 2024-08-12T08:24:49.808846Z | 2024-08-12T08:24:49.808846Z |
| ncsc-2024-0330 | Kwetsbaarheid verholpen in Asterisk | 2024-08-12T10:31:33.788930Z | 2024-08-12T10:31:33.788930Z |
| ncsc-2024-0331 | Kwetsbaarheden verholpen in Zabbix | 2024-08-12T10:34:15.273912Z | 2024-08-12T10:34:15.273912Z |
| ncsc-2024-0332 | Kwetsbaarheden verholpen in Siemens producten | 2024-08-13T09:21:28.381575Z | 2024-08-13T09:21:28.381575Z |
| ncsc-2024-0333 | Kwetsbaarheden verholpen in SAP producten | 2024-08-13T13:47:02.764070Z | 2024-08-13T13:47:02.764070Z |
| ncsc-2024-0335 | Kwetsbaarheden verholpen in Microsoft Azure componenten | 2024-08-13T18:20:23.647785Z | 2024-08-13T18:20:23.647785Z |
| ncsc-2024-0336 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2024-08-13T18:21:06.220640Z | 2024-08-13T18:21:06.220640Z |
| ncsc-2024-0337 | Kwetsbaarheden verholpen in Microsoft Office | 2024-08-13T18:21:45.385690Z | 2024-08-13T18:21:45.385690Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-133772 | SSA-133772: Zip Path Traversal Vulnerability in Teamcenter Active Workspace | 2021-12-14T00:00:00Z | 2021-12-14T00:00:00Z |
| ssa-160202 | SSA-160202: Multiple Access Control Vulnerabilities in SiPass Integrated | 2021-12-14T00:00:00Z | 2021-12-14T00:00:00Z |
| ssa-161331 | SSA-161331: Scene File Parsing Vulnerability in Simcenter STAR-CCM+ Viewer before V2021.3.1 | 2021-12-14T00:00:00Z | 2021-12-14T00:00:00Z |
| ssa-199605 | SSA-199605: Arbitrary File Download Vulnerability in SIMATIC eaSie PCS 7 Skill Package | 2021-12-14T00:00:00Z | 2021-12-14T00:00:00Z |
| ssa-352143 | SSA-352143: Multiple File Parsing Vulnerabilities in JTTK before V11.0.3.0 and JT Utilities before V13.0.3.0 | 2021-12-14T00:00:00Z | 2021-12-14T00:00:00Z |
| ssa-390195 | SSA-390195: LibVNC Vulnerabilities in SIMATIC ITC Products | 2021-12-14T00:00:00Z | 2021-12-14T00:00:00Z |
| ssa-396621 | SSA-396621: Multiple File Parsing Vulnerabilities in JTTK before V10.8.1.1 and JT Utilities before V12.8.1.1 | 2021-12-14T00:00:00Z | 2021-12-14T00:00:00Z |
| ssa-463116 | SSA-463116: Multiple Access Control Vulnerabilities in Siveillance Identity before V1.6.284.0 | 2021-12-14T00:00:00Z | 2021-12-14T00:00:00Z |
| ssa-496292 | SSA-496292: Remote Code Execution Vulnerability in POWER METER SICAM Q100 | 2021-12-14T00:00:00Z | 2021-12-14T00:00:00Z |
| ssa-523250 | SSA-523250: Improper Certificate Validation Vulnerability in SINUMERIK Edge | 2021-12-14T00:00:00Z | 2021-12-14T00:00:00Z |
| ssa-595101 | SSA-595101: Multiple File Parsing Vulnerabilities in JT2Go and Teamcenter Visualization before V13.2.0.5 | 2021-12-14T00:00:00Z | 2021-12-14T00:00:00Z |
| ssa-802578 | SSA-802578: Multiple File Parsing Vulnerabilities in JTTK before V11.1.1.0 and JT Utilities before V13.1.1.0 | 2021-12-14T00:00:00Z | 2021-12-14T00:00:00Z |
| ssa-501673 | SSA-501673: Apache Log4j Denial of Service Vulnerability (CVE-2021-45105) - Impact to Siemens Products | 2021-12-19T00:00:00Z | 2021-12-19T00:00:00Z |
| ssa-397453 | SSA-397453: Apache Log4j Vulnerabilities (Log4Shell, CVE-2021-44228, CVE-2021-45046) - Impact to Siemens Energy TraceAlertServerPLUS | 2021-12-20T00:00:00Z | 2021-12-20T00:00:00Z |
| ssa-479842 | SSA-479842: Apache Log4j Vulnerabilities - Impact to Siemens Energy Sensformer / Sensgear (Platform, Basic and Advanced) | 2021-12-21T00:00:00Z | 2021-12-23T00:00:00Z |
| ssa-784507 | SSA-784507: Apache Log4j Vulnerability (CVE-2021-44832) via JDBC Appender - Impact to Siemens Products | 2021-12-28T00:00:00Z | 2021-12-28T00:00:00Z |
| ssa-173318 | SSA-173318: Unquoted Search Path Vulnerability in SICAM PQ Analyzer | 2022-01-11T00:00:00Z | 2022-01-11T00:00:00Z |
| ssa-185699 | SSA-185699: Out of Bounds Write Vulnerabilities (NAME:WRECK) in the DNS Module of Nucleus RTOS | 2021-04-13T00:00:00Z | 2022-01-11T00:00:00Z |
| ssa-201384 | SSA-201384: Predictable UDP Port Number Vulnerability (NAME:WRECK) in the DNS Module of Nucleus RTOS | 2021-04-13T00:00:00Z | 2022-01-11T00:00:00Z |
| ssa-324998 | SSA-324998: Multiple Vulnerabilities in SICAM A8000 | 2022-01-11T00:00:00Z | 2022-01-11T00:00:00Z |
| ssa-439673 | SSA-439673: Information Disclosure Vulnerability in SIPROTEC 5 Devices | 2022-01-11T00:00:00Z | 2022-01-11T00:00:00Z |
| ssa-705111 | SSA-705111: Multiple Vulnerabilities (NAME:WRECK) in the DNS Module of Nucleus RTOS | 2021-04-13T00:00:00Z | 2022-01-11T00:00:00Z |
| ssa-766247 | SSA-766247: Authentication Vulnerability in SIMATIC Process Historian | 2021-10-12T00:00:00Z | 2022-01-11T00:00:00Z |
| ssa-789208 | SSA-789208: Multiple Vulnerabilities (INFRA:HALT) in Interniche IP-Stack based Low Voltage Devices | 2021-08-04T00:00:00Z | 2022-01-11T00:00:00Z |
| ssa-845392 | SSA-845392: Multiple Vulnerabilities in Nucleus RTOS based Siemens Energy PLUSCONTROL 1st Gen Devices | 2022-01-11T00:00:00Z | 2022-01-11T00:00:00Z |
| ssa-100232 | SSA-100232: Denial-of-Service vulnerability in SCALANCE X Switches | 2019-08-13T00:00:00Z | 2022-02-08T00:00:00Z |
| ssa-211752 | SSA-211752: Multiple NTP-Client Related Vulnerabilities in SIMATIC CP 443-1 OPC UA | 2021-06-08T00:00:00Z | 2022-02-08T00:00:00Z |
| ssa-316383 | SSA-316383: NumberJack Vulnerability in LOGO! CMR and SIMATIC RTU 3000 devices | 2021-09-14T00:00:00Z | 2022-02-08T00:00:00Z |
| ssa-609880 | SSA-609880: File Parsing Vulnerabilities in Simcenter Femap before V2022.1 | 2022-02-08T00:00:00Z | 2022-02-08T00:00:00Z |
| ssa-654775 | SSA-654775: Open Redirect Vulnerability in SINEMA Remote Connect Server | 2022-02-08T00:00:00Z | 2022-02-08T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2014_0575 | Red Hat Security Advisory: Red Hat Enterprise Developer Toolset Version 1 One-month Retirement Notice | 2014-05-29T19:35:24+00:00 | 2024-05-02T15:32:19+00:00 |
| rhsa-2014:0831 | Red Hat Security Advisory: Red Hat Developer Toolset Version 1 Retirement Notice | 2014-07-02T17:52:05+00:00 | 2024-05-02T15:33:15+00:00 |
| rhsa-2014_0831 | Red Hat Security Advisory: Red Hat Developer Toolset Version 1 Retirement Notice | 2014-07-02T17:52:05+00:00 | 2024-05-02T15:33:15+00:00 |
| rhsa-2020:2054 | Red Hat Security Advisory: Open Liberty 20.0.0.5 Runtime security update | 2020-05-11T13:36:59+00:00 | 2024-05-02T15:33:49+00:00 |
| rhsa-2020_2054 | Red Hat Security Advisory: Open Liberty 20.0.0.5 Runtime security update | 2020-05-11T13:36:59+00:00 | 2024-05-02T15:33:49+00:00 |
| rhsa-2012:1438 | Red Hat Security Advisory: Red Hat Enterprise Virtualization 2 End of Life Extension | 2012-11-08T18:05:00+00:00 | 2024-05-02T15:33:59+00:00 |
| rhsa-2012_1438 | Red Hat Security Advisory: Red Hat Enterprise Virtualization 2 End of Life Extension | 2012-11-08T18:05:00+00:00 | 2024-05-02T15:33:59+00:00 |
| rhsa-2014:1060 | Red Hat Security Advisory: Transition Red Hat Network Classic Hosted to Red Hat Subscription Management | 2014-08-14T18:08:50+00:00 | 2024-05-02T15:34:50+00:00 |
| rhsa-2014_1060 | Red Hat Security Advisory: Transition Red Hat Network Classic Hosted to Red Hat Subscription Management | 2014-08-14T18:08:50+00:00 | 2024-05-02T15:34:50+00:00 |
| rhsa-2014:1062 | Red Hat Security Advisory: Transition Red Hat Network Classic Hosted to Red Hat Subscription Management | 2014-08-15T16:04:41+00:00 | 2024-05-02T15:35:22+00:00 |
| rhsa-2014_1062 | Red Hat Security Advisory: Transition Red Hat Network Classic Hosted to Red Hat Subscription Management | 2014-08-15T16:04:41+00:00 | 2024-05-02T15:35:22+00:00 |
| rhsa-2014:1065 | Red Hat Security Advisory: Transition Red Hat Network Classic Hosted to Red Hat Subscription Management | 2014-08-15T16:55:55+00:00 | 2024-05-02T15:35:29+00:00 |
| rhsa-2014_1065 | Red Hat Security Advisory: Transition Red Hat Network Classic Hosted to Red Hat Subscription Management | 2014-08-15T16:55:55+00:00 | 2024-05-02T15:35:29+00:00 |
| rhsa-2014:1067 | Red Hat Security Advisory: Transition Red Hat Network Classic Hosted to Red Hat Subscription Management | 2014-08-15T16:15:02+00:00 | 2024-05-02T15:35:39+00:00 |
| rhsa-2014_1067 | Red Hat Security Advisory: Transition Red Hat Network Classic Hosted to Red Hat Subscription Management | 2014-08-15T16:15:02+00:00 | 2024-05-02T15:35:39+00:00 |
| rhsa-2014:1265 | Red Hat Security Advisory: Red Hat OpenShift Enterprise 1.2 - 75 Day Retirement Notice | 2014-09-18T18:34:22+00:00 | 2024-05-02T15:35:40+00:00 |
| rhsa-2014_1265 | Red Hat Security Advisory: Red Hat OpenShift Enterprise 1.2 - 75 Day Retirement Notice | 2014-09-18T18:34:22+00:00 | 2024-05-02T15:35:40+00:00 |
| rhsa-2017:0205 | Red Hat Security Advisory: Red Hat CloudForms 3.x - 30 day End Of Life Notice | 2017-01-26T17:00:32+00:00 | 2024-05-02T15:38:15+00:00 |
| rhsa-2017_0205 | Red Hat Security Advisory: Red Hat CloudForms 3.x - 30 day End Of Life Notice | 2017-01-26T17:00:32+00:00 | 2024-05-02T15:38:15+00:00 |
| rhsa-2016:2837 | Red Hat Security Advisory: Red Hat CloudForms 3.x - 90 day End Of Life Notice | 2016-11-30T16:07:21+00:00 | 2024-05-02T15:39:11+00:00 |
| rhsa-2016_2837 | Red Hat Security Advisory: Red Hat CloudForms 3.x - 90 day End Of Life Notice | 2016-11-30T16:07:21+00:00 | 2024-05-02T15:39:11+00:00 |
| rhsa-2017:0349 | Red Hat Security Advisory: Red Hat CloudForms 3.x - End Of Life Notice | 2017-02-28T16:13:32+00:00 | 2024-05-02T15:39:15+00:00 |
| rhsa-2017_0349 | Red Hat Security Advisory: Red Hat CloudForms 3.x - End Of Life Notice | 2017-02-28T16:13:32+00:00 | 2024-05-02T15:39:15+00:00 |
| rhsa-2016:2134 | Red Hat Security Advisory: Red Hat Enterprise Developer Toolset Version 3.x Retirement Notice | 2016-11-01T16:43:20+00:00 | 2024-05-02T15:40:03+00:00 |
| rhsa-2016_2134 | Red Hat Security Advisory: Red Hat Enterprise Developer Toolset Version 3.x Retirement Notice | 2016-11-01T16:43:20+00:00 | 2024-05-02T15:40:03+00:00 |
| rhsa-2015:1697 | Red Hat Security Advisory: Red Hat Storage 2.1 - 60 Day Retirement Notice | 2015-08-31T13:02:23+00:00 | 2024-05-02T15:41:40+00:00 |
| rhsa-2015_1697 | Red Hat Security Advisory: Red Hat Storage 2.1 - 60 Day Retirement Notice | 2015-08-31T13:02:23+00:00 | 2024-05-02T15:41:40+00:00 |
| rhsa-2014:0995 | Red Hat Security Advisory: Red Hat Enterprise Linux OpenStack Platform 3.0 Retirement Notice | 2014-07-31T23:52:41+00:00 | 2024-05-02T15:42:29+00:00 |
| rhsa-2014_0995 | Red Hat Security Advisory: Red Hat Enterprise Linux OpenStack Platform 3.0 Retirement Notice | 2014-07-31T23:52:41+00:00 | 2024-05-02T15:42:29+00:00 |
| rhsa-2015:1842 | Red Hat Security Advisory: Red Hat Storage 2.1 - 30 Day Retirement Notice | 2015-09-30T06:50:41+00:00 | 2024-05-02T15:42:32+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-17-117-01b | GE Multilin SR, UR, and URplus Protective Relays (Update B) | 2017-04-27T00:00:00.000000Z | 2017-07-25T00:00:00.000000Z |
| icsa-17-152-02 | NXP i.MX Product Family | 2017-06-01T00:00:00.000000Z | 2017-07-25T00:00:00.000000Z |
| icsa-17-208-01 | Continental AG Infineon S-Gold 2 (PMB 8876) | 2017-07-27T00:00:00.000000Z | 2017-07-27T00:00:00.000000Z |
| icsa-17-208-02 | Mirion Technologies Telemetry Enabled Devices | 2017-07-27T00:00:00.000000Z | 2017-07-27T00:00:00.000000Z |
| icsa-17-208-03 | PDQ Manufacturing, Inc. LaserWash, Laser Jet and ProTouch | 2017-07-27T00:00:00.000000Z | 2017-07-27T00:00:00.000000Z |
| icsa-17-213-01 | Mitsubishi Electric Europe B.V. E-Designer | 2017-08-01T00:00:00.000000Z | 2017-08-01T00:00:00.000000Z |
| icsa-17-215-01 | Schneider Electric Pro-face GP-Pro EX | 2017-08-03T00:00:00.000000Z | 2017-08-03T00:00:00.000000Z |
| icsma-17-215-01 | ICSMA-17-215-01_Siemens Molecular Imaging Vulnerabilities | 2017-08-03T00:00:00.000000Z | 2017-08-03T00:00:00.000000Z |
| icsma-17-215-02 | ICSMA-17-215-02_Siemens Molecular Imaging Vulnerabilities | 2017-08-03T00:00:00.000000Z | 2017-08-03T00:00:00.000000Z |
| icsa-17-220-01 | OSIsoft PI Integrator | 2017-08-08T00:00:00.000000Z | 2017-08-08T00:00:00.000000Z |
| icsa-17-220-02 | Moxa SoftNVR-IA Live Viewer | 2017-08-08T00:00:00.000000Z | 2017-08-08T00:00:00.000000Z |
| icsa-17-222-01 | SIMPlight SCADA Software | 2017-08-10T00:00:00.000000Z | 2017-08-10T00:00:00.000000Z |
| icsa-17-222-02 | Solar Controls Heating Control Downloader (HCDownloader) | 2017-08-10T00:00:00.000000Z | 2017-08-10T00:00:00.000000Z |
| icsa-17-222-03 | Solar Controls WATTConfig M Software | 2017-08-10T00:00:00.000000Z | 2017-08-10T00:00:00.000000Z |
| icsa-17-222-04 | Fuji Electric Monitouch V-SFT | 2017-08-10T00:00:00.000000Z | 2017-08-10T00:00:00.000000Z |
| icsa-17-222-05 | ABB SREA-01 and SREA-50 | 2017-08-10T00:00:00.000000Z | 2017-08-10T00:00:00.000000Z |
| icsa-17-227-01 | Advantech WebOP | 2017-08-15T00:00:00.000000Z | 2017-08-15T00:00:00.000000Z |
| icsma-17-227-01 | ICSMA-17-227-01_BMC Medical and 3B Medical Luna CPAP Machine | 2017-08-15T00:00:00.000000Z | 2017-08-15T00:00:00.000000Z |
| icsma-17-229-01 | ICSMA-17-229-01_Philips' DoseWise Portal Vulnerabilities | 2017-08-17T00:00:00.000000Z | 2017-08-17T00:00:00.000000Z |
| icsa-17-234-01 | Automated Logic Corporation WebCTRL, i-VU, SiteScan | 2017-08-22T00:00:00.000000Z | 2017-08-22T00:00:00.000000Z |
| icsa-17-234-02 | SpiderControl SCADA MicroBrowser | 2017-08-22T00:00:00.000000Z | 2017-08-22T00:00:00.000000Z |
| icsa-17-234-03 | SpiderControl SCADA Web Server | 2017-08-22T00:00:00.000000Z | 2017-08-22T00:00:00.000000Z |
| icsa-17-208-04 | Rockwell Automation Allen-Bradley Stratix and ArmorStratix | 2017-07-27T00:00:00.000000Z | 2017-08-24T00:00:00.000000Z |
| icsa-17-236-01 | ICSA-17-236-01_Westermo MRD-305-DIN, MRD-315, MRD-355, and MRD-455 | 2017-08-24T00:00:00.000000Z | 2017-08-24T00:00:00.000000Z |
| icsa-17-241-01 | AzeoTech DAQFactory | 2017-08-29T00:00:00.000000Z | 2017-08-29T00:00:00.000000Z |
| icsa-17-241-02 | Advantech WebAccess | 2017-08-29T00:00:00.000000Z | 2017-08-29T00:00:00.000000Z |
| icsma-17-241-01 | ICSMA-17-241-01_Abbott Laboratories ' Accent/Anthem, Accent MRI, Assurity/Allure, and Assurity MRI Pacemaker Vulnerabilities | 2017-08-29T00:00:00.000000Z | 2017-08-29T00:00:00.000000Z |
| icsa-17-150-01 | Automated Logic Corporation ALC WebCTRL, Liebert SiteScan, Carrier i-VU | 2017-05-30T00:00:00.000000Z | 2017-08-31T00:00:00.000000Z |
| icsa-17-243-03 | Siemens 7KM PAC Switched Ethernet | 2017-08-31T00:00:00.000000Z | 2017-08-31T00:00:00.000000Z |
| icsa-17-243-04 | OPW Fuel Management Systems SiteSentinel Integra and SiteSentinel iSite | 2017-08-31T00:00:00.000000Z | 2017-08-31T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-20180307-550x | Cisco 550X Series Stackable Managed Switches SNMP Denial of Service Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-07T16:00:00+00:00 |
| cisco-sa-20180307-cpcp | Cisco Prime Collaboration Provisioning Hard-Coded Password Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-07T16:00:00+00:00 |
| cisco-sa-20180307-dcnm | Cisco Data Center Network Manager Cross-Site Request Forgery Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-07T16:00:00+00:00 |
| cisco-sa-20180307-ise | Cisco Identity Services Engine Authenticated CLI Denial of Service Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-07T16:00:00+00:00 |
| cisco-sa-20180307-ise1 | Cisco Identity Services Engine Cross-Site Scripting Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-07T16:00:00+00:00 |
| cisco-sa-20180307-ise2 | Cisco Identity Services Engine Authenticated Privilege Escalation Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-07T16:00:00+00:00 |
| cisco-sa-20180307-ise3 | Cisco Identity Services Engine Local Command Injection Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-07T16:00:00+00:00 |
| cisco-sa-20180307-ise4 | Cisco Identity Services Engine Cross-Site Request Forgery Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-07T16:00:00+00:00 |
| cisco-sa-20180307-ise5 | Cisco Identity Services Engine Cross-Site Request Forgery Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-07T16:00:00+00:00 |
| cisco-sa-20180307-ise6 | Cisco Identity Services Engine Command Injection to Underlying Operating System Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-07T16:00:00+00:00 |
| cisco-sa-20180307-pdcnm | Cisco Prime Data Center Network Manager Cross-Site Scripting Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-07T16:00:00+00:00 |
| cisco-sa-20180307-res | Cisco Registered Envelope Service Cross-Site Scripting Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-07T16:00:00+00:00 |
| cisco-sa-20180307-sm | Cisco Security Manager DesktopServlet Reflected Cross-Site Scripting Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-07T16:00:00+00:00 |
| cisco-sa-20180307-staros | Cisco StarOS CLI Command Injection Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-07T16:00:00+00:00 |
| cisco-sa-20180307-staros1 | Cisco StarOS CLI Command Injection Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-07T16:00:00+00:00 |
| cisco-sa-20180307-ucs | Cisco UCS Director Cross-Site Scripting Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-07T16:00:00+00:00 |
| cisco-sa-20180307-val | Cisco Videoscape AnyRes Live Cross-Site Scripting Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-07T16:00:00+00:00 |
| cisco-sa-20180307-wsa | Cisco Web Security Appliance FTP Authentication Bypass Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-07T16:00:00+00:00 |
| cisco-sa-20180221-ucdm | Cisco Unified Communications Domain Manager Remote Code Execution Vulnerability | 2018-02-21T16:00:00+00:00 | 2018-03-09T14:47:00+00:00 |
| cisco-sa-20180316-umb | Cisco Umbrella Dashboard Session Expiration Issue | 2018-03-16T16:00:00+00:00 | 2018-03-16T16:00:00+00:00 |
| cisco-sa-20170419-energywise | Cisco IOS and IOS XE Software EnergyWise Denial of Service Vulnerabilities | 2017-04-19T16:00:00+00:00 | 2018-03-22T17:07:00+00:00 |
| cisco-sa-20180307-acs1 | Cisco Secure Access Control Server XML External Entity Injection Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-27T16:11:00+00:00 |
| cisco-sa-20180307-acs | Cisco Secure Access Control Server XML External Entity Injection Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-27T16:15:00+00:00 |
| cisco-sa-20180328-FIB-dos | Cisco IOS and IOS XE Software Forwarding Information Base Denial of Service Vulnerability | 2018-03-28T16:00:00+00:00 | 2018-03-28T16:00:00+00:00 |
| cisco-sa-20180328-cmdinj | Cisco IOS XE Software CLI Command Injection Vulnerabilities | 2018-03-28T16:00:00+00:00 | 2018-03-28T16:00:00+00:00 |
| cisco-sa-20180328-dot1x | Cisco IOS Software 802.1x Multiple-Authentication Port Authentication Bypass Vulnerability | 2018-03-28T16:00:00+00:00 | 2018-03-28T16:00:00+00:00 |
| cisco-sa-20180328-fib-dos | Cisco IOS and IOS XE Software Forwarding Information Base Denial of Service Vulnerability | 2018-03-28T16:00:00+00:00 | 2018-03-28T16:00:00+00:00 |
| cisco-sa-20180328-fwip | Cisco IOS XE Software Zone-Based Firewall IP Fragmentation Denial of Service Vulnerability | 2018-03-28T16:00:00+00:00 | 2018-03-28T16:00:00+00:00 |
| cisco-sa-20180328-igmp | Cisco IOS XE Software Internet Group Management Protocol Memory Leak Vulnerability | 2018-03-28T16:00:00+00:00 | 2018-03-28T16:00:00+00:00 |
| cisco-sa-20180328-ipv4 | Cisco IOS XE Software for Cisco Catalyst Switches IPv4 Denial of Service Vulnerability | 2018-03-28T16:00:00+00:00 | 2018-03-28T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2020-14624 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: JSON). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14631 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Audit). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14632 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Options). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14633 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14634 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14641 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Roles). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.1 Base Score 4.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14643 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Roles). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14651 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Roles). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14654 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14656 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Locking). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14663 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.2 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14678 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.2 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14680 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14697 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.2 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14702 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14725 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-15393 | In the Linux kernel 4.4 through 5.7.6 usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak aka CID-28ebeb8db770. | 2020-06-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-15469 | In QEMU 4.2.0 a MemoryRegionOps object may lack read/write callback methods leading to a NULL pointer dereference. | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-15705 | GRUB2: avoid loading unsigned kernels when GRUB is booted directly under secureboot without shim | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-15706 | GRUB2 contains a race condition leading to a use-after-free vulnerability which can be triggered by redefining a function whilst the same function is already executing. | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-15707 | GRUB2 contained integer overflows when handling the initrd command leading to a heap-based buffer overflow. | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-15859 | QEMU 4.2.0 has a use-after-free in hw/net/e1000e_core.c because a guest OS user can trigger an e1000e packet with the data's address set to the e1000e's MMIO address. | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-15863 | hw/net/xgmac.c in the XGMAC Ethernet controller in QEMU before 07-20-2020 has a buffer overflow. This occurs during packet transmission and affects the highbank and midway emulated machines. A guest user or process could use this flaw to crash the QEMU process on the host resulting in a denial of service or potential privileged code execution. This was fixed in commit 5519724a13664b43e225ca05351c60b4468e4555. | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-16092 | In QEMU through 5.0.0 an assertion failure can occur in the network packet processing. This issue affects the e1000e and vmxnet3 network devices. A malicious guest user/process could use this flaw to abort the QEMU process on the host resulting in a denial of service condition in net_tx_pkt_add_raw_fragment in hw/net/net_tx_pkt.c. | 2020-08-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-16166 | The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c. | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-1711 | An out-of-bounds heap buffer access flaw was found in the way the iSCSI Block driver in QEMU versions 2.12.0 before 4.2.1 handled a response coming from an iSCSI server while checking the status of a Logical Address Block (LBA) in an iscsi_co_block_status() routine. A remote user could use this flaw to crash the QEMU process resulting in a denial of service or potential execution of arbitrary code with privileges of the QEMU process on the host. | 2020-02-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-1712 | A heap use-after-free vulnerability was found in systemd before version v245-rc1 where asynchronous Polkit queries are performed while handling dbus messages. A local unprivileged attacker can abuse this flaw to crash systemd services or potentially execute code and elevate their privileges by sending specially crafted dbus messages. | 2020-03-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-1720 | A flaw was found in PostgreSQL's "ALTER ... DEPENDS ON EXTENSION" where sub-commands did not perform authorization checks. An authenticated attacker could use this flaw in certain configurations to perform drop objects such as function triggers et al. leading to database corruption. This issue affects PostgreSQL versions before 12.2 before 11.7 before 10.12 and before 9.6.17. | 2020-03-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-1752 | A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that when processed by the glob function would potentially lead to arbitrary code execution. This was fixed in version 2.32. | 2020-04-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-7211 | tftp.c in libslirp 4.1.0 as used in QEMU 4.2.0 does not prevent ..\ directory traversal on Windows. | 2020-01-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-202103-1337 | A remote buffer overflow vulnerability was discovered in some Aruba Instant Access Point … | 2022-05-04T08:12:33.719000Z |
| var-202103-0230 | A vulnerability has been identified in Solid Edge SE2020 (All Versions < SE2020MP13), Sol… | 2022-05-04T08:13:28.253000Z |
| var-202109-1793 | A vulnerability has been identified in NX 1980 Series (All versions < V1984), Solid Edge … | 2022-05-04T08:13:30.769000Z |
| var-202103-1346 | A remote arbitrary file read vulnerability was discovered in some Aruba Instant Access Po… | 2022-05-04T08:14:15.277000Z |
| var-202109-1974 | A CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal) v… | 2022-05-04T08:16:26.089000Z |
| var-202103-1333 | A remote arbitrary file modification vulnerability was discovered in some Aruba Instant A… | 2022-05-04T08:21:39.419000Z |
| var-202106-0696 | Improper buffer restrictions in a subsystem in the Intel(R) CSME versions before 11.8.86,… | 2022-05-04T08:21:47.847000Z |
| var-202109-0234 | A vulnerability in the Internet Key Exchange Version 2 (IKEv2) support for the AutoReconn… | 2022-05-04T08:24:39.300000Z |
| var-202109-1826 | A vulnerability has been identified in NX 1980 Series (All versions < V1984), Solid Edge … | 2022-05-04T08:28:05.251000Z |
| var-202112-2273 | Certain NETGEAR devices are affected by stored XSS. This affects RAX200 before 1.0.5.126,… | 2022-05-04T08:32:36.348000Z |
| var-202112-2536 | Huawei AR1220F-S is a new generation enterprise-class gigabit router. Huawei AR1220F-… | 2022-05-04T08:32:36.056000Z |
| var-202111-1111 | Dell BIOS contains an improper input validation vulnerability. A local authenticated mali… | 2022-05-04T08:32:44.162000Z |
| var-202110-1910 | Huawei Technologies Co., Ltd. is the world's leading provider of information and communic… | 2022-05-04T08:32:45.818000Z |
| var-202111-0183 | IBM MQ 9.1 LTS, 9.1 CD, 9.2 LTS, and 9.2CD is vulnerable to a denial of service attack ca… | 2022-05-04T08:32:45.325000Z |
| var-202108-2302 | Samsung (China) Investment Co., Ltd. is the headquarters of Samsung Group in China. As of… | 2022-05-04T08:32:53.307000Z |
| var-202108-2323 | Fuji Xerox (China) Co., Ltd. was established on January 3, 1995. It is a wholly-owned hol… | 2022-05-04T08:32:53.296000Z |
| var-202108-2344 | MP C3004ex is a color digital copier. Ricoh (China) Investment Co., Ltd. MP C3004ex h… | 2022-05-04T08:32:53.285000Z |
| var-202108-2365 | MOBOTIX M26 is a camera of MOBOTIX. MOBOTIX M26 has an unauthorized access vulnerabil… | 2022-05-04T08:32:53.274000Z |
| var-202108-2386 | Fuji Xerox (China) Co., Ltd. was established on January 3, 1995. It is a wholly-owned hol… | 2022-05-04T08:32:53.264000Z |
| var-202108-2407 | Fuji Xerox (China) Co., Ltd. was established on January 3, 1995. It is a wholly-owned hol… | 2022-05-04T08:32:53.253000Z |
| var-202108-2428 | Lexmark MS610dn is a printer product of Lexmark. Lexmark MS610dn has an unauthorized … | 2022-05-04T08:32:53.242000Z |
| var-202108-2449 | Samsung (China) Investment Co., Ltd. is the headquarters of Samsung Group in China. As of… | 2022-05-04T08:32:53.231000Z |
| var-202108-2470 | The HP Photosmart 5520 series is a mid-range inkjet printer. The HP Photosmart 5520 s… | 2022-05-04T08:32:53.216000Z |
| var-202108-2491 | DocuPrint CM305 df is a printer. DocuPrint CM305 df has an unauthorized access vulner… | 2022-05-04T08:32:53.204000Z |
| var-202108-2512 | Hong Kong Broadband Network Limited is a leading provider of integrated telecommunication… | 2022-05-04T08:32:53.193000Z |
| var-202108-2533 | Ricoh (China) Investment Co., Ltd. provides office image processing equipment (such as MF… | 2022-05-04T08:32:53.181000Z |
| var-202108-2554 | Huawei HG659 is a home gateway. Huawei HG659 has an information disclosure vulnerabil… | 2022-05-04T08:32:53.166000Z |
| var-202108-2575 | X463de is a printer of Lexmark International Inc. Lexmark X463de has an unauthorized … | 2022-05-04T08:32:53.156000Z |
| var-202107-1705 | WS5302 is a wireless controller. Beijing Starnet Ruijie Networks Technology Co., Ltd.… | 2022-05-04T08:32:54.947000Z |
| var-202107-1726 | D-Link DIR-600M is a wireless router. D-Link DIR-600M has weak password vulnerability… | 2022-05-04T08:32:54.936000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2006-000392 | Ruby contains a vulnerability that prevents safe level 4 from functioning as a sandbox. | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000540 | Microsoft Windows Indexing Service cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000599 | Nagasaki Electronic Prefectural Office System vulnerable to bypass authentication | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000600 | Nagasaki Electronic Prefectural Office System authentication information vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000601 | Eudora Japanese version stops working after the application crashes | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000602 | Multiple email clients vulnerable in handling an attachement inapropriately | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000603 | Hatena Toolbar sends URL information unecnrypted | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000604 | Nagasaki Electronic Prefectural Office System SQL injection vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000605 | Hyper NIKKI System allows unauthorized email submission | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000606 | Minnu's filer2 vulnerable in allowing arbitrary Ruby script execution | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000609 | CAFEMILK Shopping Cart CGI cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000610 | QUICK CART OS command injection vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000611 | QUICK CART cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000612 | FreeStyleWiki cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000613 | Trac cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000614 | Winny buffer overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000615 | Apache Struts Validator allows to bypass input data validation | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000616 | DonutP and UnDonut confirmation dialog display vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000617 | Multiple email clients vulnerable to directory traversal due to inappropriate unicode handling | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000619 | MyWeb SQL injection vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000620 | RWiki arbitrary Ruby script execution vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000621 | RWiki cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000622 | dotProject cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000623 | Joomla! cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000624 | CGI RESCUE WebFORM allows unauthorized email transmission | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000625 | CGI RESCUE WebFORM allows unauthorized email transmission | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000626 | dotProject cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000627 | Phorum cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000628 | Wiki clone products vulnerable to denial of service attacks | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000629 | Wiki clone products vulnerable to denial of service attacks | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2015:1018-1 | Security update for php53 | 2014-10-28T10:05:33Z | 2014-10-28T10:05:33Z |
| suse-su-2015:1265-1 | Security update for php53 | 2014-10-28T10:05:33Z | 2014-10-28T10:05:33Z |
| suse-su-2015:0239-1 | Security update for flash-player | 2014-11-14T12:52:02Z | 2014-11-14T12:52:02Z |
| suse-su-2015:0493-1 | Security update for flash-player | 2014-11-14T12:52:02Z | 2014-11-14T12:52:02Z |
| suse-su-2015:0723-1 | Security update for flash-player | 2014-11-14T12:52:02Z | 2014-11-14T12:52:02Z |
| suse-su-2015:0880-1 | Security update for flash-player | 2014-11-14T12:52:02Z | 2014-11-14T12:52:02Z |
| suse-su-2015:1064-1 | Security update for flash-player | 2014-11-14T12:52:02Z | 2014-11-14T12:52:02Z |
| suse-su-2015:1137-1 | Security update for flash-player | 2014-11-14T12:52:02Z | 2014-11-14T12:52:02Z |
| suse-su-2015:0426-1 | Security update for wireshark | 2014-11-14T12:53:20Z | 2014-11-14T12:53:20Z |
| suse-su-2015:0653-1 | Security update for wireshark | 2014-11-14T12:53:20Z | 2014-11-14T12:53:20Z |
| suse-su-2015:1098-1 | Security update for wireshark | 2014-11-14T12:53:20Z | 2014-11-14T12:53:20Z |
| suse-su-2015:0259-1 | Recommended update for ntp | 2014-11-18T12:31:05Z | 2014-11-18T12:31:05Z |
| suse-su-2015:1173-1 | Recommended update for ntp | 2014-11-18T12:31:05Z | 2014-11-18T12:31:05Z |
| suse-su-2015:0343-2 | Security update for IBM Java | 2014-11-19T10:21:52Z | 2014-11-19T10:21:52Z |
| suse-su-2015:1086-2 | Security update for IBM Java | 2014-11-19T10:21:52Z | 2014-11-19T10:21:52Z |
| suse-su-2015:0343-1 | Security update for IBM Java | 2014-11-21T16:40:20Z | 2014-11-21T16:40:20Z |
| suse-su-2015:1086-4 | Security update for IBM Java | 2014-11-21T16:40:20Z | 2014-11-21T16:40:20Z |
| suse-su-2015:0232-1 | Security update for powerpc-utils | 2015-01-07T17:50:01Z | 2015-01-07T17:50:01Z |
| suse-su-2015:0241-1 | Security update for libvirt | 2015-01-08T09:48:42Z | 2015-01-08T09:48:42Z |
| suse-su-2015:0324-1 | Security update for openstack-nova | 2015-01-19T16:34:28Z | 2015-01-19T16:34:28Z |
| suse-su-2015:0290-1 | Security update for krb5 | 2015-01-21T10:07:55Z | 2015-01-21T10:07:55Z |
| suse-su-2015:0290-2 | Security update for krb5 | 2015-01-21T10:07:55Z | 2015-01-21T10:07:55Z |
| suse-su-2015:0307-1 | Security update for wireshark | 2015-01-22T08:55:12Z | 2015-01-22T08:55:12Z |
| suse-su-2015:0357-1 | Security update for kvm and libvirt | 2015-01-23T01:22:37Z | 2015-01-23T01:22:37Z |
| suse-su-2015:0271-1 | Security update for xdg-utils | 2015-01-24T11:13:05Z | 2015-01-24T11:13:05Z |
| suse-su-2015:0320-1 | Security update for hivex | 2015-01-26T09:47:11Z | 2015-01-26T09:47:11Z |
| suse-su-2015:0281-1 | Security update for strongswan | 2015-01-28T11:41:44Z | 2015-01-28T11:41:44Z |
| suse-su-2015:0367-1 | Security update for vorbis-tools | 2015-01-29T09:42:46Z | 2015-01-29T09:42:46Z |
| suse-su-2015:0292-1 | Security update for elfutils | 2015-01-30T13:46:33Z | 2015-01-30T13:46:33Z |
| suse-su-2015:0355-1 | Security update for unzip | 2015-01-30T13:46:36Z | 2015-01-30T13:46:36Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2017:1823-1 | Security update for irssi | 2017-07-07T23:03:39Z | 2017-07-07T23:03:39Z |
| opensuse-su-2017:1824-1 | Security update for irssi | 2017-07-07T23:03:39Z | 2017-07-07T23:03:39Z |
| opensuse-su-2017:1993-1 | Security update for chromium | 2017-07-28T12:59:09Z | 2017-07-28T12:59:09Z |
| opensuse-su-2017:1994-1 | Security update for chromium | 2017-07-28T12:59:09Z | 2017-07-28T12:59:09Z |
| opensuse-su-2017:2209-1 | Security update for MozillaThunderbird | 2017-08-18T09:46:47Z | 2017-08-18T09:46:47Z |
| opensuse-su-2017:2482-1 | Security update for chromium | 2017-09-15T05:01:20Z | 2017-09-15T05:01:20Z |
| opensuse-su-2017:2491-1 | Security update for chromium | 2017-09-15T05:01:20Z | 2017-09-15T05:01:20Z |
| opensuse-su-2017:2537-1 | Security update for freexl | 2017-09-21T06:52:21Z | 2017-09-21T06:52:21Z |
| opensuse-su-2017:2539-1 | Security update for freexl | 2017-09-21T06:52:21Z | 2017-09-21T06:52:21Z |
| opensuse-su-2017:2557-1 | Security update for Chromium | 2017-09-23T06:52:44Z | 2017-09-23T06:52:44Z |
| opensuse-su-2017:2558-1 | Security update for Chromium | 2017-09-23T06:52:44Z | 2017-09-23T06:52:44Z |
| opensuse-su-2017:2567-1 | Security update for openjpeg2 | 2017-09-25T21:34:20Z | 2017-09-25T21:34:20Z |
| opensuse-su-2017:2568-1 | Recommended update for openjpeg | 2017-09-25T21:35:07Z | 2017-09-25T21:35:07Z |
| opensuse-su-2017:2594-1 | Security update for fmpeg | 2017-09-28T21:13:29Z | 2017-09-28T21:13:29Z |
| opensuse-su-2017:2685-1 | Security update for openjpeg2 | 2017-10-10T07:16:40Z | 2017-10-10T07:16:40Z |
| opensuse-su-2017:2686-1 | Security update for openjpeg2 | 2017-10-10T07:16:40Z | 2017-10-10T07:16:40Z |
| opensuse-su-2017:2707-1 | Security update for MozillaThunderbird | 2017-10-11T17:57:43Z | 2017-10-11T17:57:43Z |
| opensuse-su-2017:2710-1 | Security update for MozillaThunderbird | 2017-10-11T17:57:43Z | 2017-10-11T17:57:43Z |
| opensuse-su-2017:2731-1 | Security update for mbedtls | 2017-10-16T18:55:23Z | 2017-10-16T18:55:23Z |
| opensuse-su-2017:2736-1 | Security update for mbedtls | 2017-10-16T18:55:23Z | 2017-10-16T18:55:23Z |
| opensuse-su-2017:2832-1 | Security update for irssi | 2017-10-23T07:58:14Z | 2017-10-23T07:58:14Z |
| opensuse-su-2017:2835-1 | Security update for irssi | 2017-10-23T07:58:14Z | 2017-10-23T07:58:14Z |
| opensuse-su-2017:2833-1 | Security update for jq | 2017-10-23T07:58:55Z | 2017-10-23T07:58:55Z |
| opensuse-su-2017:2834-1 | Security update for jq | 2017-10-23T07:58:55Z | 2017-10-23T07:58:55Z |
| opensuse-su-2017:2893-1 | Security update for SDL2 | 2017-10-27T19:17:03Z | 2017-10-27T19:17:03Z |
| opensuse-su-2017:2895-1 | Security update for SDL2 | 2017-10-27T19:17:03Z | 2017-10-27T19:17:03Z |
| opensuse-su-2017:2984-1 | Security update for redis | 2017-11-10T13:02:13Z | 2017-11-10T13:02:13Z |
| opensuse-su-2017:2994-1 | Security update for redis | 2017-11-10T13:02:13Z | 2017-11-10T13:02:13Z |
| opensuse-su-2017:2976-1 | Security update for ansible | 2017-11-10T13:03:17Z | 2017-11-10T13:03:17Z |
| opensuse-su-2017:2978-1 | Security update for ansible | 2017-11-10T13:03:17Z | 2017-11-10T13:03:17Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2015-00025 | Maxthon Cloud Browser application 地址栏欺骗漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00026 | WordPress插件IP Ban存在多个跨站请求伪造漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00027 | Huawei eSpace Desktop V100R001C03拒绝服务漏洞(CNVD-2015-00027) | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00028 | Huawei eSpace Desktop V200R003C00存在多个不可信搜索路径漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00029 | Huawei eSpace Desktop V100R001C03拒绝服务漏洞(CNVD-2015-00029) | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00030 | Huawei eSpace Desktop V200R001C03拒绝服务漏洞(CNVD-2015-00030) | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00031 | LibreSSL双重释放漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00032 | IBM Rational AppScan Source信息泄露漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00033 | IBM WebSphere Service Registry and Repository预期访问限制绕过漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00034 | IBM Security Identity Manager跨站请求伪造漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00035 | Tribal Tribiq CMS路径泄露漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00036 | WhatsApp Non-Printable字符串处理拒绝服务漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00037 | Microsoft Windows 'AhcVerifyAdminContext'本地权限提升漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00038 | RubyGems Doorkeeper跨站请求伪造漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00039 | DBMail 'dm_db.c' CRAM-MD5验证绕过漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00040 | Info-ZIP UnZip越界拒绝服务漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00041 | Serendipity HTML注入漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00042 | Libmspack 'qtmd.c'无限循环拒绝服务漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00061 | libssh双重释放漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00043 | VideoLAN VLC media player堆缓冲区溢出漏洞 | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00044 | VideoLAN VLC Media Player栈缓冲区溢出漏洞 | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00045 | VideoLAN VLC Media Player缓冲区溢出漏洞(CNVD-2015-00045) | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00046 | VideoLAN VLC media player拒绝服务漏洞(CNVD-2015-00046) | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00047 | VideoLAN VLC Media Player缓冲区溢出漏洞(CNVD-2015-00047) | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00048 | VideoLAN VLC media player缓冲区溢出漏洞(CNVD-2015-00048) | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00049 | Facebook HipHop Virtual Machine CRLF注入漏洞 | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00050 | Facebook HipHop Virtual Machine预期访问限制绕过漏洞 | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00051 | Facebook HipHop Virtual Machine crypgraphic保护机制绕过漏洞 | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00053 | Facebook HipHop Virtual Machine信息泄露漏洞 | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00054 | DFLabs PTK跨站请求伪造漏洞 | 2015-01-04 | 2015-01-06 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTA-2000-AVI-046 | vulnérabilité du service imagerie sous Windows 2000 | 2000-09-11T00:00:00.000000 | 2000-09-11T00:00:00.000000 |
| certa-2000-avi-046 | vulnérabilité du service imagerie sous Windows 2000 | 2000-09-11T00:00:00.000000 | 2000-09-11T00:00:00.000000 |
| CERTA-2000-AVI-047 | Vulnérabilité de RPC sous Windows2000 | 2000-09-12T00:00:00.000000 | 2000-09-12T00:00:00.000000 |
| certa-2000-avi-047 | Vulnérabilité de RPC sous Windows2000 | 2000-09-12T00:00:00.000000 | 2000-09-12T00:00:00.000000 |
| CERTA-2000-AVI-048 | Vulnérabilité du client telnet sous Windows 2000 | 2000-09-15T00:00:00.000000 | 2000-09-15T00:00:00.000000 |
| certa-2000-avi-048 | Vulnérabilité du client telnet sous Windows 2000 | 2000-09-15T00:00:00.000000 | 2000-09-15T00:00:00.000000 |
| CERTA-2000-AVI-049 | Virus FunnyStory | 2000-09-19T00:00:00.000000 | 2000-09-19T00:00:00.000000 |
| certa-2000-avi-049 | Virus FunnyStory | 2000-09-19T00:00:00.000000 | 2000-09-19T00:00:00.000000 |
| CERTA-2000-AVI-050 | Vulnérabilité dans le démon klogd sous Linux | 2000-09-20T00:00:00.000000 | 2000-09-20T00:00:00.000000 |
| certa-2000-avi-050 | Vulnérabilité dans le démon klogd sous Linux | 2000-09-20T00:00:00.000000 | 2000-09-20T00:00:00.000000 |
| CERTA-2000-AVI-051 | Vulnérabilités dans CISCOSecure sous Windows NT Server | 2000-09-22T00:00:00.000000 | 2000-09-22T00:00:00.000000 |
| certa-2000-avi-051 | Vulnérabilités dans CISCOSecure sous Windows NT Server | 2000-09-22T00:00:00.000000 | 2000-09-22T00:00:00.000000 |
| CERTA-2000-AVI-052 | Vulnérabilité sous Windows liée à l'ouverture d'un Document Office | 2000-09-25T00:00:00.000000 | 2000-09-25T00:00:00.000000 |
| certa-2000-avi-052 | Vulnérabilité sous Windows liée à l'ouverture d'un Document Office | 2000-09-25T00:00:00.000000 | 2000-09-25T00:00:00.000000 |
| CERTA-2000-AVI-053 | Vulnérabilité dans HP OpenView | 2000-09-28T00:00:00.000000 | 2000-09-28T00:00:00.000000 |
| certa-2000-avi-053 | Vulnérabilité dans HP OpenView | 2000-09-28T00:00:00.000000 | 2000-09-28T00:00:00.000000 |
| CERTA-2000-AVI-054 | Vulnérabilité dans le garde barrière PIX de CISCO | 2000-09-29T00:00:00.000000 | 2000-09-29T00:00:00.000000 |
| certa-2000-avi-054 | Vulnérabilité dans le garde barrière PIX de CISCO | 2000-09-29T00:00:00.000000 | 2000-09-29T00:00:00.000000 |
| CERTA-2000-AVI-055 | Vulnérabilités des LPC sous Windows 2000 et NT | 2000-10-04T00:00:00.000000 | 2000-10-04T00:00:00.000000 |
| certa-2000-avi-055 | Vulnérabilités des LPC sous Windows 2000 et NT | 2000-10-04T00:00:00.000000 | 2000-10-04T00:00:00.000000 |
| CERTA-2000-AVI-056 | Vulnérabilité dans la fonction de « fusion-publipostage » sous Word 97 et 2000 | 2000-10-09T00:00:00.000000 | 2000-10-09T00:00:00.000000 |
| certa-2000-avi-056 | Vulnérabilité dans la fonction de « fusion-publipostage » sous Word 97 et 2000 | 2000-10-09T00:00:00.000000 | 2000-10-09T00:00:00.000000 |
| CERTA-2000-AVI-057 | Vulnérabilité dans les protections de fichiers sous Windows 9x et Me | 2000-10-11T00:00:00.000000 | 2000-10-11T00:00:00.000000 |
| certa-2000-avi-057 | Vulnérabilité dans les protections de fichiers sous Windows 9x et Me | 2000-10-11T00:00:00.000000 | 2000-10-11T00:00:00.000000 |
| CERTA-2000-AVI-058 | Vulnérabilité dans IPX/SPX de Microsoft sous Windows 9x/ME | 2000-10-12T00:00:00.000000 | 2000-10-12T00:00:00.000000 |
| certa-2000-avi-058 | Vulnérabilité dans IPX/SPX de Microsoft sous Windows 9x/ME | 2000-10-12T00:00:00.000000 | 2000-10-12T00:00:00.000000 |
| CERTA-2000-AVI-059 | Vulnérabilité dans la machine virtuelle Java de Microsoft | 2000-10-13T00:00:00.000000 | 2000-10-13T00:00:00.000000 |
| CERTA-2000-AVI-060 | Vulnérabilité dans le cache d'authentification d'Internet Explorer | 2000-10-13T00:00:00.000000 | 2000-10-13T00:00:00.000000 |
| certa-2000-avi-059 | Vulnérabilité dans la machine virtuelle Java de Microsoft | 2000-10-13T00:00:00.000000 | 2000-10-13T00:00:00.000000 |
| certa-2000-avi-060 | Vulnérabilité dans le cache d'authentification d'Internet Explorer | 2000-10-13T00:00:00.000000 | 2000-10-13T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTA-2003-ALE-006 | Vulnérabilité dans l'affichage des adresses réticulaires | 2003-12-19T00:00:00.000000 | 2004-02-03T00:00:00.000000 |
| certa-2003-ale-006 | Vulnérabilité dans l'affichage des adresses réticulaires | 2003-12-19T00:00:00.000000 | 2004-02-03T00:00:00.000000 |
| CERTA-2004-ALE-002 | Propagation du virux Bizex | 2004-02-26T00:00:00.000000 | 2004-02-26T00:00:00.000000 |
| certa-2004-ale-002 | Propagation du virux Bizex | 2004-02-26T00:00:00.000000 | 2004-02-26T00:00:00.000000 |
| CERTA-2004-ALE-003 | Propagation du ver Phatbot | 2004-03-19T00:00:00.000000 | 2004-03-19T00:00:00.000000 |
| certa-2004-ale-003 | Propagation du ver Phatbot | 2004-03-19T00:00:00.000000 | 2004-03-19T00:00:00.000000 |
| CERTA-2004-ALE-005 | Vulnérabilité d'Internet Explorer | 2004-04-09T00:00:00.000000 | 2004-04-15T00:00:00.000000 |
| certa-2004-ale-005 | Vulnérabilité d'Internet Explorer | 2004-04-09T00:00:00.000000 | 2004-04-15T00:00:00.000000 |
| CERTA-2004-ALE-006 | Vulnérabilité SMB sous Windows | 2004-04-28T00:00:00.000000 | 2004-04-28T00:00:00.000000 |
| certa-2004-ale-006 | Vulnérabilité SMB sous Windows | 2004-04-28T00:00:00.000000 | 2004-04-28T00:00:00.000000 |
| CERTA-2004-ALE-007 | Exploitation de la vulnérabilité LSASS sous Windows : appration du ver Sasser | 2004-05-02T00:00:00.000000 | 2004-05-02T00:00:00.000000 |
| certa-2004-ale-007 | Exploitation de la vulnérabilité LSASS sous Windows : appration du ver Sasser | 2004-05-02T00:00:00.000000 | 2004-05-02T00:00:00.000000 |
| CERTA-2004-ALE-008 | Vulnérabilité de Safari | 2004-05-19T00:00:00.000000 | 2004-05-24T00:00:00.000000 |
| certa-2004-ale-008 | Vulnérabilité de Safari | 2004-05-19T00:00:00.000000 | 2004-05-24T00:00:00.000000 |
| CERTA-2004-ALE-009 | Vulnérabilités d'Internet Explorer | 2004-06-09T00:00:00.000000 | 2004-08-03T00:00:00.000000 |
| certa-2004-ale-009 | Vulnérabilités d'Internet Explorer | 2004-06-09T00:00:00.000000 | 2004-08-03T00:00:00.000000 |
| CERTA-2004-ALE-004 | Vulnérabilité du composant dtlogin de CDE | 2004-03-26T00:00:00.000000 | 2004-08-05T00:00:00.000000 |
| certa-2004-ale-004 | Vulnérabilité du composant dtlogin de CDE | 2004-03-26T00:00:00.000000 | 2004-08-05T00:00:00.000000 |
| CERTA-2004-ALE-010 | Vulnérabilité du service Telnet de Cisco IOS | 2004-08-30T00:00:00.000000 | 2004-08-30T00:00:00.000000 |
| certa-2004-ale-010 | Vulnérabilité du service Telnet de Cisco IOS | 2004-08-30T00:00:00.000000 | 2004-08-30T00:00:00.000000 |
| CERTA-2004-ALE-011 | Diffusion de programmes exploitant la faille GDI+ | 2004-09-23T00:00:00.000000 | 2004-09-23T00:00:00.000000 |
| certa-2004-ale-011 | Diffusion de programmes exploitant la faille GDI+ | 2004-09-23T00:00:00.000000 | 2004-09-23T00:00:00.000000 |
| CERTA-2004-ALE-012 | Vulnérabilité d'Internet Explorer | 2004-11-09T00:00:00.000000 | 2004-12-02T00:00:00.000000 |
| certa-2004-ale-012 | Vulnérabilité d'Internet Explorer | 2004-11-09T00:00:00.000000 | 2004-12-02T00:00:00.000000 |
| CERTA-2004-ALE-013 | Vulnérabilité dans le composant ActiveX DHTML Edit d'Internet Explorer | 2004-12-20T00:00:00.000000 | 2004-12-20T00:00:00.000000 |
| certa-2004-ale-013 | Vulnérabilité dans le composant ActiveX DHTML Edit d'Internet Explorer | 2004-12-20T00:00:00.000000 | 2004-12-20T00:00:00.000000 |
| CERTA-2004-ALE-014 | Exploitation massive d'une faille du forum phpBB | 2004-12-22T00:00:00.000000 | 2004-12-22T00:00:00.000000 |
| certa-2004-ale-014 | Exploitation massive d'une faille du forum phpBB | 2004-12-22T00:00:00.000000 | 2004-12-22T00:00:00.000000 |
| CERTA-2005-ALE-001 | Vulnérabilité d'Internet Explorer | 2005-01-03T00:00:00.000000 | 2005-01-11T00:00:00.000000 |
| certa-2005-ale-001 | Vulnérabilité d'Internet Explorer | 2005-01-03T00:00:00.000000 | 2005-01-11T00:00:00.000000 |