Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2007-5286 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-5281. Reason: This candidate is a duplicate of CVE-2007-5281. Notes: All CVE users should reference CVE-2007-5281 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2007-10-09T00:00:00 | 2007-10-11T09:00:00 |
| CVE-2007-5287 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-5282. Reason: This candidate is a duplicate of CVE-2007-5282. Notes: All CVE users should reference CVE-2007-5282 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2007-10-09T00:00:00 | 2007-10-11T09:00:00 |
| CVE-2007-5288 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-5283. Reason: This candidate is a duplicate of CVE-2007-5283. Notes: All CVE users should reference CVE-2007-5283 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2007-10-09T00:00:00 | 2007-10-11T09:00:00 |
| CVE-2002-1638 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-2153. Reason: This candidate is a duplicate of CVE-2002-2153. Notes: All CVE users should reference CVE-2002-2153 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-03-28T05:00:00 | 2007-10-18T09:00:00 |
| CVE-2002-2135 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1618. Reason: This candidate is a duplicate of CVE-2002-1618. Notes: All CVE users should reference CVE-2002-1618 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-11-16T21:17:00 | 2007-10-18T09:00:00 |
| CVE-2002-2136 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1590. Reason: This candidate is a duplicate of CVE-2002-1590. Notes: All CVE users should reference CVE-2002-1590 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-11-16T21:17:00 | 2007-10-18T09:00:00 |
| CVE-2002-2147 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1828. Reason: This candidate is a duplicate of CVE-2002-1828. Notes: All CVE users should reference CVE-2002-1828 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-11-16T21:17:00 | 2007-10-18T09:00:00 |
| CVE-2002-2151 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1651. Reason: This candidate is a duplicate of CVE-2002-1651. Notes: All CVE users should reference CVE-2002-1651 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-11-16T21:17:00 | 2007-10-18T09:00:00 |
| CVE-2002-2157 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1660. Reason: This candidate is a duplicate of CVE-2002-1660. Notes: All CVE users should reference CVE-2002-1660 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-11-16T21:17:00 | 2007-10-18T09:00:00 |
| CVE-2002-2160 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1798. Reason: This candidate is a duplicate of CVE-2002-1798. Notes: All CVE users should reference CVE-2002-1798 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-11-16T21:17:00 | 2007-10-18T09:00:00 |
| CVE-2002-2194 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1589. Reason: This candidate is a duplicate of CVE-2002-1589. Notes: All CVE users should reference CVE-2002-1589 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-11-16T21:17:00 | 2007-10-18T09:00:00 |
| CVE-2007-5586 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-5587. Reason: This candidate is a duplicate of CVE-2007-5587. Notes: All CVE users should reference CVE-2007-5587 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2007-10-19T21:00:00 | 2007-11-09T10:00:00 |
| CVE-2007-1627 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2006-4606. Reason: This candidate is a duplicate of CVE-2006-4606. Notes: All CVE users should reference CVE-2006-4606 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2007-03-23T21:00:00 | 2007-11-15T10:00:00 |
| CVE-2006-7224 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2006-7227, CVE-2005-4872, CVE-2006-7228. Reason: this candidate was SPLIT into other identifiers in order to reflect different affected versions and distinct vendor fixes. Notes: All CVE users should consult CVE-2006-7227, CVE-2005-4872, and CVE-2006-7228 to determine which ID is appropriate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2007-11-08T20:00:00 | 2007-11-16T10:00:00 |
| CVE-2007-4721 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-6113. Reason: This candidate is a duplicate of CVE-2007-6113. Notes: All CVE users should reference CVE-2007-6113 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2007-09-05T19:00:00 | 2007-11-28T10:00:00 |
| CVE-2007-5125 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-1171. Reason: This candidate is a duplicate of CVE-2007-1171. Notes: All CVE users should reference CVE-2007-1171 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2007-09-27T19:00:00 | 2007-11-28T10:00:00 |
| CVE-2007-5908 |
N/A
|
Buffer overflow in the (1) sysfs_show_available_clocksources and (2) sysfs_show_current_clocksources functions in Linux kernel 2.6.23 and earlier might allow local users to cause a denial of service or execute arbitrary code via crafted clock source names. NOTE: follow-on analysis by Linux developers states that "There is no way for unprivileged users (or really even the root user) to add new clocksources. | N/A | N/A | 2007-11-09T19:00:00 | 2007-11-28T10:00:00 |
| CVE-2007-6034 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-6062. Reason: This candidate is a duplicate of CVE-2007-6062. Notes: All CVE users should reference CVE-2007-6062 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2007-11-20T11:00:00 | 2007-11-28T10:00:00 |
| CVE-2007-3595 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-3399. Reason: This candidate is a duplicate of CVE-2007-3399. Notes: All CVE users should reference CVE-2007-3399 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2007-07-06T18:00:00 | 2007-12-06T10:00:00 |
| CVE-2007-5553 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-4158. Reason: This candidate is a duplicate of CVE-2007-4158. It was based on a vague pre-advisory, so the duplicate was not detected until more details were provided. Notes: All CVE users should reference CVE-2007-4158 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2007-10-18T20:00:00 | 2007-12-06T10:00:00 |
| CVE-2007-6370 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-5583. Reason: This candidate is a duplicate of CVE-2007-5583. Notes: All CVE users should reference CVE-2007-5583 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2007-12-15T01:00:00 | 2007-12-19T10:00:00 |
| CVE-2007-6590 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2008-2809. Reason: This candidate is a duplicate of CVE-2008-2809. Notes: All CVE users should reference CVE-2008-2809 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2007-12-28T21:00:00 | 2008-01-04T10:00:00 |
| CVE-2007-6678 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-6167. Reason: This candidate is a duplicate of CVE-2007-6167. Notes: All CVE users should reference CVE-2007-6167 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2008-01-10T01:00:00 | 2008-01-19T10:00:00 |
| CVE-2007-4576 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-4575. Reason: This candidate is a reservation duplicate of CVE-2007-4575. Notes: All CVE users should reference CVE-2007-4575 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2008-01-29T01:00:00 | 2008-02-12T10:00:00 |
| CVE-2007-5968 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-6313. Reason: this candidate's description and references were inconsistent and described unrelated, non-security issues. The original intended issue is covered by CVE-2007-6313. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2007-12-10T19:00:00 | 2008-02-26T10:00:00 |
| CVE-2008-0626 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-6303. Reason: This candidate is a duplicate of CVE-2007-6303. Notes: All CVE users should reference CVE-2007-6303 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2008-02-06T20:00:00 | 2008-04-15T09:00:00 |
| CVE-2008-0627 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-6304. Reason: This candidate is a duplicate of CVE-2007-6304. Notes: All CVE users should reference CVE-2007-6304 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2008-02-06T20:00:00 | 2008-04-15T09:00:00 |
| CVE-2008-1683 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2008-0887. Reason: This candidate is a duplicate of CVE-2008-0887. Notes: All CVE users should reference CVE-2008-0887 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2008-04-06T23:00:00 | 2008-04-15T09:00:00 |
| CVE-2007-5317 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-5292. Reason: This candidate is a duplicate of CVE-2007-5292. Notes: All CVE users should reference CVE-2007-5292 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2007-10-09T21:00:00 | 2008-04-18T09:00:00 |
| CVE-2004-1886 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-1848. Reason: This candidate is a duplicate of CVE-2004-1848. Notes: All CVE users should reference CVE-2004-1848 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-05-10T04:00:00 | 2008-05-02T09:00:00 |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2004-0859 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2004. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2004-0860 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2004. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2004-0861 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2004. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2004-0868 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0866. Reason: This candidate is a duplicate of CVE-2004-0866. Notes: The description for CVE-2004-0866 was inadvertently attached to this issue instead. All CVE users should reference CVE-2004-0866 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2004-09-24T04:00:00 | 2005-02-15T10:00:00 |
| CVE-2004-0874 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-1123. Reason: This candidate is a reservation duplicate of CVE-2004-1123. Notes: All CVE users should reference CVE-2004-1123 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2004-12-05T05:00:00 | 2005-02-06T10:00:00 |
| CVE-2004-0890 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reasons: This candidate is a reservation duplicate of another candidate. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2004-12-08T05:00:00 | 2005-02-06T10:00:00 |
| CVE-2004-0910 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0815. Reason: This candidate is a reservation duplicate of CVE-2004-0815. Notes: All CVE users should reference CVE-2004-0815 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2004-09-28T04:00:00 | 2005-02-06T10:00:00 |
| CVE-2004-0943 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none | N/A | N/A | 2005-10-27T04:00:00Z | 2024-09-16T18:55:44.074Z |
| CVE-2004-0948 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. It was a duplicate assignment before public disclosure. Notes: none | N/A | N/A | 2005-02-06T05:00:00Z | 2024-09-16T23:31:07.546Z |
| CVE-2004-0954 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0597. Reason: This candidate is a reservation duplicate of CVE-2004-0597. Notes: All CVE users should reference CVE-2004-0597 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2004-10-21T04:00:00 | 2005-02-06T10:00:00 |
| CVE-2004-0955 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0599. Reason: This candidate is a reservation duplicate of CVE-2004-0599 (the first item listed in that candidate). Notes: All CVE users should reference CVE-2004-0599 instead of this candidate. All references and descriptions have been removed from this candidate to prevent accidental usage | N/A | N/A | 2004-11-04T05:00:00 | 2005-02-06T10:00:00 |
| CVE-2004-0973 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0457. Reason: This candidate is a reservation duplicate of CVE-2004-0457. Notes: All CVE users should reference CVE-2004-0457 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2004-10-20T04:00:00 | 2005-02-06T10:00:00 |
| CVE-2004-0995 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2004. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2004-1159 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-1122, CVE-2004-1314. Reason: this was an out-of-band assignment duplicate intended for one issue, but the description and references inadvertently combined multiple issues. Notes: All CVE users should consult CVE-2004-1122 and CVE-2004-1314 to determine which ID is appropriate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2004-12-10T05:00:00 | 2004-12-22T10:00:00 |
| CVE-2004-1238 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2004. Notes: none | N/A | N/A | 2005-04-18T04:00:00Z | 2024-09-17T00:11:40.612Z |
| CVE-2004-1239 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2004. Notes: none | N/A | N/A | 2005-04-18T04:00:00Z | 2024-09-16T16:12:30.256Z |
| CVE-2004-1240 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2004. Notes: none | N/A | N/A | 2005-04-18T04:00:00Z | 2024-09-16T16:28:52.817Z |
| CVE-2004-1241 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2004. Notes: none | N/A | N/A | 2005-04-18T04:00:00Z | 2024-09-17T00:01:12.481Z |
| CVE-2004-1242 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2004. Notes: none | N/A | N/A | 2005-04-18T04:00:00Z | 2024-09-17T00:26:08.485Z |
| CVE-2004-1243 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2004. Notes: none | N/A | N/A | 2005-04-18T04:00:00Z | 2024-09-16T19:46:03.245Z |
| CVE-2004-1344 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2004. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2004-1479 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0928. Reason: This candidate is a duplicate of CVE-2004-0928. Notes: All CVE users should reference CVE-2004-0928 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-02-13T05:00:00 | 2005-02-21T10:00:00 |
| CVE-2004-1886 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-1848. Reason: This candidate is a duplicate of CVE-2004-1848. Notes: All CVE users should reference CVE-2004-1848 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-05-10T04:00:00 | 2008-05-02T09:00:00 |
| CVE-2004-2141 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-1827. Reason: This candidate is a duplicate of CVE-2004-1827. Notes: All CVE users should reference CVE-2004-1827 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-06-30T04:00:00 | 2005-08-19T09:00:00 |
| CVE-2004-2285 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-2022. Reason: This candidate is a duplicate of CVE-2004-2022. Notes: All CVE users should reference CVE-2004-2022 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-08-04T04:00:00 | 2005-08-10T09:00:00 |
| CVE-2004-2404 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-2347. Reason: This candidate is a duplicate of CVE-2004-2347. Notes: All CVE users should reference CVE-2004-2347 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-08-17T04:00:00 | 2005-10-14T09:00:00 |
| CVE-2004-2770 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2011-3389. Reason: This candidate is a duplicate of CVE-2011-3389. Notes: All CVE users should reference CVE-2011-3389 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2011-09-25T10:00:00 | 2011-09-29T09:00:00 |
| CVE-2004-2772 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none | N/A | N/A | 2020-11-05T19:52:53 | 2020-11-05T19:52:53 |
| CVE-2004-2773 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none | N/A | N/A | 2020-11-05T19:53:15 | 2020-11-05T19:53:15 |
| CVE-2004-2774 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none | N/A | N/A | 2020-11-05T19:53:37 | 2020-11-05T19:53:37 |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2004-0859 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:01.963 | 2023-11-07T01:56:48.870 |
| fkie_cve-2004-0860 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:01.993 | 2023-11-07T01:56:49.080 |
| fkie_cve-2004-0861 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.010 | 2023-11-07T01:56:49.287 |
| fkie_cve-2004-0868 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0866. Reason: This candid… | 2004-12-23T05:00:00.000 | 2023-11-07T01:56:49.510 |
| fkie_cve-2004-0874 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-1123. Reason: This candid… | 2005-01-10T05:00:00.000 | 2023-11-07T01:56:49.570 |
| fkie_cve-2004-0890 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reasons: This candidate is a… | 2005-01-10T05:00:00.000 | 2023-11-07T01:56:49.840 |
| fkie_cve-2004-0910 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0815. Reason: This candid… | 2004-11-03T05:00:00.000 | 2023-11-07T01:56:50.007 |
| fkie_cve-2004-0943 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was w… | 2004-12-31T05:00:00.000 | 2023-11-07T01:56:50.467 |
| fkie_cve-2004-0948 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was w… | 2004-12-31T05:00:00.000 | 2023-11-07T01:56:50.537 |
| fkie_cve-2004-0954 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0597. Reason: This candid… | 2004-12-23T05:00:00.000 | 2023-11-07T01:56:50.610 |
| fkie_cve-2004-0955 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0599. Reason: This candid… | 2004-12-23T05:00:00.000 | 2023-11-07T01:56:50.650 |
| fkie_cve-2004-0973 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0457. Reason: This candid… | 2004-12-23T05:00:00.000 | 2023-11-07T01:56:50.880 |
| fkie_cve-2004-0995 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.027 | 2023-11-07T01:56:51.080 |
| fkie_cve-2004-1159 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-1122, CVE-2004-1314. Reas… | 2005-01-10T05:00:00.000 | 2023-11-07T01:56:52.650 |
| fkie_cve-2004-1238 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was i… | 2004-12-31T05:00:00.000 | 2023-11-07T01:56:53.340 |
| fkie_cve-2004-1239 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was i… | 2004-12-31T05:00:00.000 | 2023-11-07T01:56:53.373 |
| fkie_cve-2004-1240 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was i… | 2004-12-31T05:00:00.000 | 2023-11-07T01:56:53.407 |
| fkie_cve-2004-1241 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was i… | 2004-12-31T05:00:00.000 | 2023-11-07T01:56:53.443 |
| fkie_cve-2004-1242 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was i… | 2004-12-31T05:00:00.000 | 2023-11-07T01:56:53.477 |
| fkie_cve-2004-1243 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was i… | 2004-12-31T05:00:00.000 | 2023-11-07T01:56:53.503 |
| fkie_cve-2004-1344 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.057 | 2023-11-07T01:56:54.170 |
| fkie_cve-2004-1479 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0928. Reason: This candid… | 2004-12-31T05:00:00.000 | 2023-11-07T01:56:55.597 |
| fkie_cve-2004-1886 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-1848. Reason: This candid… | 2004-03-23T05:00:00.000 | 2023-11-07T01:56:58.833 |
| fkie_cve-2004-2141 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-1827. Reason: This candid… | 2004-12-31T05:00:00.000 | 2023-11-07T01:57:01.147 |
| fkie_cve-2004-2285 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-2022. Reason: This candid… | 2004-12-31T05:00:00.000 | 2023-11-07T01:57:02.447 |
| fkie_cve-2004-2404 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-2347. Reason: This candid… | 2004-12-31T05:00:00.000 | 2023-11-07T01:57:03.633 |
| fkie_cve-2004-2770 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2011-3389. Reason: This candid… | 2011-09-25T10:55:04.737 | 2023-11-07T01:57:07.220 |
| fkie_cve-2004-2772 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:14.193 | 2023-11-07T01:57:07.453 |
| fkie_cve-2004-2773 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:14.253 | 2023-11-07T01:57:07.690 |
| fkie_cve-2004-2774 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:14.347 | 2023-11-07T01:57:07.920 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-vw7g-jq9m-3q9v |
|
Unauthorized File Access in glance | 2020-09-02T18:23:35Z | 2020-08-31T18:36:38Z |
| ghsa-8j8c-7jfh-h6hx |
|
Code Injection in js-yaml | 2019-06-04T20:14:07Z | 2020-08-31T18:36:43Z |
| ghsa-3qh4-r86r-grvm |
|
Arbitrary JavaScript Execution in typed-function | 2020-09-02T18:24:39Z | 2020-08-31T18:36:57Z |
| ghsa-rffp-mc78-wjf7 |
|
Command Injection in cocos-utils | 2020-09-02T18:26:48Z | 2020-08-31T18:37:21Z |
| ghsa-8v5f-hp78-jgxq |
|
Signature Verification Bypass in jwt-simple | 2019-06-06T15:30:33Z | 2020-08-31T18:37:26Z |
| ghsa-9w87-4j72-gcv7 |
|
Insecure Default Configuration in graphql-code-generator | 2020-09-02T18:27:54Z | 2020-08-31T18:37:32Z |
| ghsa-xrr6-6ww3-f3qm |
|
Sandbox Breakout / Arbitrary Code Execution in value-censorship | 2020-09-02T21:25:58Z | 2020-08-31T18:39:27Z |
| ghsa-j8qr-rvcv-crhv |
|
Malicious Package in electron-native-notify | 2020-09-11T21:18:05Z | 2020-08-31T18:40:50Z |
| ghsa-4627-w373-375v |
|
Malicious Package in grunt-radical | 2020-09-11T21:22:24Z | 2020-08-31T18:41:06Z |
| ghsa-4x6x-782q-jfc4 |
|
Command Injection in node-wifi | 2020-09-03T02:38:47Z | 2020-08-31T18:41:45Z |
| ghsa-mxmj-84q8-34r7 |
|
Command Injection in expressfs | 2020-09-03T02:39:49Z | 2020-08-31T18:41:47Z |
| ghsa-4q8f-5xxj-946r |
|
Command Injection in addax | 2020-09-03T02:40:51Z | 2020-08-31T18:41:49Z |
| ghsa-crfx-5phg-hmw9 |
|
Cross-Site Scripting in ids-enterprise | 2019-06-13T18:59:12Z | 2020-08-31T18:41:52Z |
| ghsa-49r3-3h96-rwj6 |
|
Cross-Site Scripting in ids-enterprise | 2019-06-13T19:09:31Z | 2020-08-31T18:41:54Z |
| ghsa-hpfq-8wx8-cgqw |
|
Cross-Site Scripting in ids-enterprise | 2019-06-13T18:59:18Z | 2020-08-31T18:41:56Z |
| ghsa-8mgg-5x65-m4m4 |
|
Command Injection in soletta-dev-app | 2020-09-11T21:08:19Z | 2020-08-31T18:41:59Z |
| ghsa-v86x-f47q-f7f4 |
|
Unauthorized File Access in atompm | 2020-09-11T21:09:24Z | 2020-08-31T18:42:01Z |
| ghsa-j6v9-xgvh-f796 |
|
Command Injection in wxchangba | 2020-09-11T21:11:34Z | 2020-08-31T18:42:04Z |
| ghsa-9r3m-mhfm-39cm |
|
Incorrect Calculation in bigint-money | 2020-09-11T21:10:29Z | 2020-08-31T18:42:08Z |
| ghsa-crpm-fm48-chj7 |
|
SQL Injection in resquel | 2020-09-11T21:13:44Z | 2020-08-31T18:42:11Z |
| ghsa-48gc-5j93-5cfq |
|
Path Traversal in serve | 2020-09-11T21:15:54Z | 2020-08-31T18:42:15Z |
| ghsa-45j8-pm75-5v8x |
|
Path Traversal in simplehttpserver | 2019-02-07T18:18:04Z | 2020-08-31T18:42:22Z |
| ghsa-536q-8gxx-m782 |
|
Cross-Site Scripting in dojo | 2019-09-11T23:02:57Z | 2020-08-31T18:42:32Z |
| ghsa-wgw3-gf4p-62xc |
|
Command Injection in wizard-syncronizer | 2020-09-11T21:16:59Z | 2020-08-31T18:42:46Z |
| ghsa-hq8g-qq57-5275 |
|
SQL Injection in untitled-model | 2020-09-11T21:24:33Z | 2020-08-31T18:43:13Z |
| ghsa-cpgr-wmr9-qxv4 |
|
Cross-Site Scripting in serve | 2020-09-11T21:20:14Z | 2020-08-31T18:43:20Z |
| ghsa-5g6j-8hv4-vfgj |
|
Cross-Site Scripting in node-red | 2020-09-11T21:21:19Z | 2020-08-31T18:43:22Z |
| ghsa-3f95-w5h5-fq86 |
|
Prototype Pollution in mergify | 2020-09-11T21:22:24Z | 2020-08-31T18:43:27Z |
| ghsa-qrmc-fj45-qfc2 |
|
Prototype Pollution in extend | 2019-02-07T18:03:28Z | 2020-08-31T18:43:30Z |
| ghsa-g8vp-6hv4-m67c |
|
Command Injection in entitlements | 2020-09-11T21:23:29Z | 2020-08-31T18:43:32Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2020-132 |
|
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, a crafted TFLit… | tensorflow | 2020-09-25T19:15:00Z | 2020-10-29T16:15:00Z |
| pysec-2020-133 |
|
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, if a TFLite sav… | tensorflow | 2020-09-25T19:15:00Z | 2020-10-29T16:15:00Z |
| pysec-2020-134 |
|
In TensorFlow Lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, saved models in… | tensorflow | 2020-09-25T19:15:00Z | 2020-10-29T16:15:00Z |
| pysec-2020-142 |
|
A mis-handling of invalid unicode characters in the Java implementation of Tink versions … | tink | 2020-10-19T13:15:00Z | 2020-10-29T22:16:00Z |
| pysec-2020-61 |
|
In lookatme (python/pypi package) versions prior to 2.3.0, the package automatically load… | lookatme | 2020-10-26T18:15:00Z | 2020-11-13T16:40:00Z |
| pysec-2020-60 |
|
A stored cross-site scripting (XSS) vulnerability affects the Web UI in Locust before 1.3… | locust | 2020-11-09T21:15:00Z | 2020-11-17T20:37:00Z |
| pysec-2020-159 |
|
In Alerta before version 8.1.0, users may be able to bypass LDAP authentication if they p… | alerta-server | 2020-11-06T18:15:00Z | 2020-11-17T21:08:00Z |
| pysec-2020-67 |
|
The cache action in action/cache.py in MoinMoin through 1.9.10 allows directory traversal… | moin | 2020-11-10T17:15:00Z | 2020-11-24T17:20:00Z |
| pysec-2020-18 |
|
The previous default setting for Airflow's Experimental API was to allow all API requests… | apache-airflow | 2020-11-10T16:15:00Z | 2020-11-24T17:29:00Z |
| pysec-2020-157 |
|
Open redirect vulnerability in werkzeug before 0.11.6 via a double slash in the URL. | werkzeug | 2020-11-18T15:15:00Z | 2020-12-01T16:05:00Z |
| pysec-2020-29 |
|
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker … | brotli | 2020-09-15T10:15:00Z | 2020-12-02T12:15:00Z |
| pysec-2020-74 |
|
Multiple cross-site scripting (XSS) vulnerabilities in Papermerge before 1.5.2 allow remo… | papermerge | 2020-12-02T08:15:00Z | 2020-12-02T16:29:00Z |
| pysec-2020-75 |
|
petl before 1.68, in some configurations, allows resolution of entities in an XML document. | petl | 2020-11-26T05:15:00Z | 2020-12-03T16:48:00Z |
| pysec-2020-108 |
|
** DISPUTED ** svm_predict_values in svm.cpp in Libsvm v324, as used in scikit-learn 0.23… | scikit-learn | 2020-11-21T21:15:00Z | 2020-12-03T18:50:00Z |
| pysec-2020-69 |
|
Python oic is a Python OpenID Connect implementation. In Python oic before version 1.2.1,… | oic | 2020-12-02T20:15:00Z | 2020-12-08T02:37:00Z |
| pysec-2020-68 |
|
OAuthenticator is an OAuth login mechanism for JupyterHub. In oauthenticator from version… | oauthenticator | 2020-12-01T21:15:00Z | 2020-12-08T17:50:00Z |
| pysec-2020-163 |
|
A flaw was found in all python-ecdsa versions before 0.13.3, where it did not correctly v… | ecdsa | 2020-01-02T15:15:00Z | 2020-12-08T18:32:00Z |
| pysec-2020-98 |
|
Red Discord Bot Dashboard is an easy-to-use interactive web dashboard to control your Red… | red-dashboard | 2020-12-09T00:15:00Z | 2020-12-10T20:15:00Z |
| pysec-2020-52 |
|
jupyterhub-systemdspawner enables JupyterHub to spawn single-user notebook servers using … | jupyterhub-systemdspawner | 2020-12-09T17:15:00Z | 2020-12-10T21:46:00Z |
| pysec-2020-141 |
|
In TensorFlow release candidate versions 2.4.0rc*, the general implementation for matchin… | tensorflow | 2020-12-10T23:15:00Z | 2020-12-14T17:42:00Z |
| pysec-2020-300 |
|
In TensorFlow release candidate versions 2.4.0rc*, the general implementation for matchin… | tensorflow-cpu | 2020-12-10T23:15:00Z | 2020-12-14T17:42:00Z |
| pysec-2020-335 |
|
In TensorFlow release candidate versions 2.4.0rc*, the general implementation for matchin… | tensorflow-gpu | 2020-12-10T23:15:00Z | 2020-12-14T17:42:00Z |
| pysec-2020-140 |
|
In affected versions of TensorFlow the tf.raw_ops.DataFormatVecPermute API does not valid… | tensorflow | 2020-12-10T23:15:00Z | 2020-12-14T19:08:00Z |
| pysec-2020-109 |
|
In some conditions, a snap package built by snapcraft includes the current directory in L… | snapcraft | 2020-12-04T03:15:00Z | 2020-12-14T20:36:00Z |
| pysec-2020-20 |
|
In Apache Airflow versions prior to 1.10.13, the Charts and Query View of the old (Flask-… | apache-airflow | 2020-12-14T10:15:00Z | 2020-12-15T15:40:00Z |
| pysec-2020-72 |
|
OpenSlides is a free, Web-based presentation and assembly system for managing and project… | openslides | 2020-12-18T19:15:00Z | 2020-12-22T20:11:00Z |
| pysec-2020-22 |
|
Incorrect Session Validation in Apache Airflow Webserver versions prior to 1.10.14 with d… | apache-airflow | 2020-12-21T17:15:00Z | 2020-12-22T21:23:00Z |
| pysec-2020-49 |
|
** DISPUTED ** jsonpickle through 1.4.1 allows remote code execution during deserializati… | jsonpickle | 2020-12-17T16:15:00Z | 2020-12-23T15:38:00Z |
| pysec-2020-143 |
|
tlslite-ng is an open source python library that implements SSL and TLS cryptographic pro… | tlslite-ng | 2020-12-21T17:15:00Z | 2020-12-23T16:09:00Z |
| pysec-2020-117 |
|
In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the `SparseFillEmpty… | tensorflow | 2020-09-25T19:15:00Z | 2020-12-23T18:33:00Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2017-1000042 | Mapbox.js versions 1.x prior to 1.6.5 and 2.x prior to 2.1.7 are vulnerable to a cross-si… | 2015-10-24T00:00:00.000Z |
| gsd-2015-7519 | It is possible in some cases, for clients to overwrite headers set by the server, resulti… | 2015-11-23T00:00:00.000Z |
| gsd-2015-9097 | The mail gem before 2.5.5 for Ruby (aka A Really Ruby Mail Library) is vulnerable to SMTP… | 2015-12-09T00:00:00.000Z |
| gsd-2015-8968 | Git allows executing arbitrary shell commands using git-remote-ext via a remote URLs. Nor… | 2015-12-11T00:00:00.000Z |
| gsd-2015-5312 | Nokogiri version 1.6.7.1 has been released, pulling in several upstream patches to the ve… | 2015-12-15T00:00:00.000Z |
| gsd-2015-8969 | git-fastclone before 1.0.5 passes user modifiable strings directly to a shell command. An… | 2015-12-15T00:00:00.000Z |
| gsd-2015-7541 | The contents of the `image_path`, `colors`, and `depth` variables generated from possibly… | 2016-01-04T00:00:00.000Z |
| gsd-2017-1000043 | Mapbox.js versions 1.x prior to 1.6.6 and 2.x prior to 2.2.4 are vulnerable to a cross-si… | 2016-01-12T00:00:00.000Z |
| gsd-2015-7565 | By default, Ember will escape any values in Handlebars templates that use double curlies … | 2016-01-14T00:00:00.000Z |
| gsd-2015-8314 | Devise version before 3.5.4 uses cookies to implement a "Remember me" functionality. Howe… | 2016-01-18T00:00:00.000Z |
| gsd-2015-7499 | Nokogiri version 1.6.7.2 has been released, pulling in several upstream patches to the ve… | 2016-01-19T00:00:00.000Z |
| gsd-2015-7576 | There is a timing attack vulnerability in the basic authentication support in Action Cont… | 2016-01-25T00:00:00.000Z |
| gsd-2015-7577 | There is a vulnerability in how the nested attributes feature in Active Record handles up… | 2016-01-25T00:00:00.000Z |
| gsd-2015-7578 | There is a possible XSS vulnerability in rails-html-sanitizer. This vulnerability has bee… | 2016-01-25T00:00:00.000Z |
| gsd-2015-7579 | There is a XSS vulnerability in `Rails::Html::FullSanitizer` used by Action View's `strip… | 2016-01-25T00:00:00.000Z |
| gsd-2015-7580 | There is a possible XSS vulnerability in the white list sanitizer in the rails-html-sanit… | 2016-01-25T00:00:00.000Z |
| gsd-2015-7581 | There is an object leak vulnerability for wildcard controllers in Action Pack. This vulne… | 2016-01-25T00:00:00.000Z |
| gsd-2016-0751 | There is a possible object leak which can lead to a denial of service vulnerability in Ac… | 2016-01-25T00:00:00.000Z |
| gsd-2016-0752 | There is a possible directory traversal and information leak vulnerability in Action View… | 2016-01-25T00:00:00.000Z |
| gsd-2016-0753 | There is a possible input validation circumvention vulnerability in Active Model. This vu… | 2016-01-25T00:00:00.000Z |
| gsd-2016-2097 | There is a possible directory traversal and information leak vulnerability in Action Vie… | 2016-02-29T00:00:00.000Z |
| gsd-2016-2098 | There is a possible remote code execution vulnerability in Action Pack. This vulnerabilit… | 2016-02-29T00:00:00.000Z |
| gsd-2016-3098 | "`Administrate::ApplicationController` actions didn't have CSRF protection. Remote attack… | 2016-04-01T00:00:00.000Z |
| gsd-2016-10193 | espeak-ruby passes user modifiable strings directly to a shell command. An attacker can e… | 2016-04-13T00:00:00.000Z |
| gsd-2016-3693 | Safemode is initialised with an optional 'delegate' object. If the delegated object is a … | 2016-04-20T00:00:00.000Z |
| gsd-2016-10194 | festivaltts4r passes user modifiable strings directly to a shell command. An attacker can… | 2016-04-23T00:00:00.000Z |
| gsd-2016-4442 | Carefully crafted requests can expose information about strings and objects allocated dur… | 2016-05-18T00:00:00.000Z |
| gsd-2015-8806 | Nokogiri is affected by series of vulnerabilities in libxml2 and libxslt, which are libra… | 2016-06-07T00:00:00.000Z |
| gsd-2016-5697 | ruby-saml prior to version 1.3.0 is vulnerable to an XML signature wrapping attack in the… | 2016-06-24T00:00:00.000Z |
| gsd-2016-10735 | In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the da… | 2016-07-27T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| MAL-2022-1214 | Malicious code in axp-utility-belt (npm) | 2022-05-19T08:37:22Z | 2022-05-19T08:37:22Z |
| MAL-2022-4669 | Malicious code in mollie-design-system (npm) | 2022-05-19T08:37:22Z | 2022-05-19T08:37:22Z |
| MAL-2022-7106 | Malicious code in website-404-error-page (npm) | 2022-05-19T08:37:21Z | 2022-05-19T08:37:22Z |
| mal-2022-1214 | Malicious code in axp-utility-belt (npm) | 2022-05-19T08:37:22Z | 2022-05-19T08:37:22Z |
| mal-2022-4669 | Malicious code in mollie-design-system (npm) | 2022-05-19T08:37:22Z | 2022-05-19T08:37:22Z |
| mal-2022-7106 | Malicious code in website-404-error-page (npm) | 2022-05-19T08:37:21Z | 2022-05-19T08:37:22Z |
| MAL-2022-1212 | Malicious code in axp-base (npm) | 2022-05-19T08:37:22Z | 2022-05-19T08:37:27Z |
| MAL-2022-1213 | Malicious code in axp-shared-scripts (npm) | 2022-05-19T08:37:22Z | 2022-05-19T08:37:27Z |
| mal-2022-1212 | Malicious code in axp-base (npm) | 2022-05-19T08:37:22Z | 2022-05-19T08:37:27Z |
| mal-2022-1213 | Malicious code in axp-shared-scripts (npm) | 2022-05-19T08:37:22Z | 2022-05-19T08:37:27Z |
| MAL-2022-2377 | Malicious code in ddc-classnames-js (npm) | 2022-05-19T08:37:22Z | 2022-05-19T08:37:28Z |
| MAL-2022-2378 | Malicious code in ddc-new-relic (npm) | 2022-05-19T08:37:22Z | 2022-05-19T08:37:28Z |
| MAL-2022-2464 | Malicious code in dgse-tools-mgm-elf-helper (npm) | 2022-05-19T08:37:22Z | 2022-05-19T08:37:28Z |
| mal-2022-2377 | Malicious code in ddc-classnames-js (npm) | 2022-05-19T08:37:22Z | 2022-05-19T08:37:28Z |
| mal-2022-2378 | Malicious code in ddc-new-relic (npm) | 2022-05-19T08:37:22Z | 2022-05-19T08:37:28Z |
| mal-2022-2464 | Malicious code in dgse-tools-mgm-elf-helper (npm) | 2022-05-19T08:37:22Z | 2022-05-19T08:37:28Z |
| MAL-2022-377 | Malicious code in @kibt/operation-track (npm) | 2022-05-23T10:22:10Z | 2022-05-23T10:22:10Z |
| MAL-2022-378 | Malicious code in @kibt/weblogger (npm) | 2022-05-23T10:22:10Z | 2022-05-23T10:22:10Z |
| mal-2022-377 | Malicious code in @kibt/operation-track (npm) | 2022-05-23T10:22:10Z | 2022-05-23T10:22:10Z |
| mal-2022-378 | Malicious code in @kibt/weblogger (npm) | 2022-05-23T10:22:10Z | 2022-05-23T10:22:10Z |
| MAL-2022-2022 | Malicious code in colors_express (npm) | 2022-05-31T11:55:20Z | 2022-05-31T11:55:21Z |
| mal-2022-2022 | Malicious code in colors_express (npm) | 2022-05-31T11:55:20Z | 2022-05-31T11:55:21Z |
| MAL-2022-2590 | Malicious code in dragox-utilities (npm) | 2022-05-31T12:53:57Z | 2022-05-31T12:53:57Z |
| mal-2022-2590 | Malicious code in dragox-utilities (npm) | 2022-05-31T12:53:57Z | 2022-05-31T12:53:57Z |
| MAL-2022-391 | Malicious code in @logistics-frontend/client-core (npm) | 2022-05-31T12:55:54Z | 2022-05-31T12:55:55Z |
| MAL-2022-392 | Malicious code in @logistics-frontend/core (npm) | 2022-05-31T12:55:55Z | 2022-05-31T12:55:55Z |
| MAL-2022-393 | Malicious code in @logistics-frontend/hooks (npm) | 2022-05-31T12:55:55Z | 2022-05-31T12:55:55Z |
| MAL-2022-396 | Malicious code in @logistics-frontend/polyfills (npm) | 2022-05-31T12:55:55Z | 2022-05-31T12:55:55Z |
| MAL-2022-397 | Malicious code in @logistics-frontend/types (npm) | 2022-05-31T12:55:55Z | 2022-05-31T12:55:55Z |
| MAL-2022-398 | Malicious code in @logistics-frontend/ui-old (npm) | 2022-05-31T12:55:54Z | 2022-05-31T12:55:55Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2022-2404 | HCL BigFix: Schwachstelle ermöglicht Offenlegung von Informationen | 2022-12-26T23:00:00.000+00:00 | 2022-12-26T23:00:00.000+00:00 |
| wid-sec-w-2022-2405 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2022-12-26T23:00:00.000+00:00 | 2022-12-26T23:00:00.000+00:00 |
| wid-sec-w-2022-2406 | vim: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Benutzerrechten | 2017-03-02T23:00:00.000+00:00 | 2022-12-26T23:00:00.000+00:00 |
| wid-sec-w-2022-2407 | vim: Schwachstelle ermöglicht Denial of Service | 2017-02-27T23:00:00.000+00:00 | 2022-12-26T23:00:00.000+00:00 |
| wid-sec-w-2022-2409 | D-LINK Router DIR-882: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2022-12-26T23:00:00.000+00:00 | 2022-12-26T23:00:00.000+00:00 |
| wid-sec-w-2022-2410 | D-LINK Router DIR-846: Mehrere Schwachstellen ermöglichen Codeausführung | 2022-12-26T23:00:00.000+00:00 | 2022-12-26T23:00:00.000+00:00 |
| wid-sec-w-2022-1950 | Splunk Enterprise: Mehrere Schwachstellen | 2022-11-02T23:00:00.000+00:00 | 2022-12-27T23:00:00.000+00:00 |
| wid-sec-w-2022-2303 | Microsoft Windows und Microsoft Windows Server: Mehrere Schwachstellen | 2022-12-13T23:00:00.000+00:00 | 2022-12-27T23:00:00.000+00:00 |
| wid-sec-w-2022-0161 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2022-03-31T22:00:00.000+00:00 | 2022-12-28T23:00:00.000+00:00 |
| wid-sec-w-2022-1744 | GnuPGP: Schwachstelle ermöglicht Codeausführung | 2022-10-16T22:00:00.000+00:00 | 2022-12-28T23:00:00.000+00:00 |
| wid-sec-w-2022-1962 | libTIFF: Schwachstelle ermöglicht Denial of Service | 2022-03-28T22:00:00.000+00:00 | 2022-12-28T23:00:00.000+00:00 |
| wid-sec-w-2022-2380 | D-LINK DIR-825: Mehrere Schwachstellen ermöglichen Command Injection | 2022-12-20T23:00:00.000+00:00 | 2022-12-28T23:00:00.000+00:00 |
| wid-sec-w-2022-2412 | ESRI ArcGIS: Schwachstelle ermöglicht Offenlegung von Informationen | 2022-12-28T23:00:00.000+00:00 | 2022-12-28T23:00:00.000+00:00 |
| wid-sec-w-2022-0812 | IBM Java: Mehrere Schwachstellen ermöglichen Denial of Service | 2022-02-22T23:00:00.000+00:00 | 2023-01-01T23:00:00.000+00:00 |
| wid-sec-w-2022-1034 | Mozilla Firefox und Thunderbird: Mehrere Schwachstellen | 2022-03-08T23:00:00.000+00:00 | 2023-01-01T23:00:00.000+00:00 |
| wid-sec-w-2023-0003 | D-LINK Router: Schwachstelle ermöglicht Codeausführung | 2023-01-01T23:00:00.000+00:00 | 2023-01-01T23:00:00.000+00:00 |
| wid-sec-w-2023-0004 | Cacti: Mehrere Schwachstellen ermöglichen Cross-Site Scripting | 2021-08-31T22:00:00.000+00:00 | 2023-01-01T23:00:00.000+00:00 |
| wid-sec-w-2023-0005 | Cacti RRDtool: Schwachstelle ermöglicht Cross-Site Scripting | 2020-11-23T23:00:00.000+00:00 | 2023-01-01T23:00:00.000+00:00 |
| wid-sec-w-2023-0006 | Cacti RRDtool: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit den Rechten des Dienstes | 2020-02-23T23:00:00.000+00:00 | 2023-01-01T23:00:00.000+00:00 |
| wid-sec-w-2023-0007 | Linux Kernel: Schwachstelle ermöglicht Denial of Service und Privilegien-Erweiterung | 2023-01-01T23:00:00.000+00:00 | 2023-01-01T23:00:00.000+00:00 |
| wid-sec-w-2023-0008 | IBM FileNet Content Manager: Mehrere Schwachstellen ermöglichen Denial of Service | 2023-01-01T23:00:00.000+00:00 | 2023-01-01T23:00:00.000+00:00 |
| wid-sec-w-2022-0206 | ffmpeg: Schwachstellen ermöglichen Codeausführung | 2021-01-03T23:00:00.000+00:00 | 2023-01-02T23:00:00.000+00:00 |
| wid-sec-w-2022-2414 | MatrixSSL: Schwachstelle ermöglicht Codeausführung | 2022-12-28T23:00:00.000+00:00 | 2023-01-02T23:00:00.000+00:00 |
| wid-sec-w-2023-0010 | ffmpeg: Schwachstelle ermöglicht Offenlegung von Informationen | 2021-08-05T22:00:00.000+00:00 | 2023-01-02T23:00:00.000+00:00 |
| wid-sec-w-2023-0013 | Fortinet FortiManager: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2023-01-03T23:00:00.000+00:00 | 2023-01-03T23:00:00.000+00:00 |
| wid-sec-w-2023-0014 | Fortinet FortiWeb: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2023-01-03T23:00:00.000+00:00 | 2023-01-03T23:00:00.000+00:00 |
| wid-sec-w-2023-0016 | IBM Tivoli Monitoring: Mehrere Schwachstellen | 2023-01-03T23:00:00.000+00:00 | 2023-01-03T23:00:00.000+00:00 |
| wid-sec-w-2023-0018 | Android Patchday Januar 2023 | 2023-01-03T23:00:00.000+00:00 | 2023-01-03T23:00:00.000+00:00 |
| wid-sec-w-2023-0019 | Kubernetes: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2021-07-14T22:00:00.000+00:00 | 2023-01-03T23:00:00.000+00:00 |
| wid-sec-w-2023-0020 | GNU libc: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2019-01-21T23:00:00.000+00:00 | 2023-01-03T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2024-0401 | Kwetsbaarheid verholpen in Ivanti Endpoint Manager Mobile | 2024-10-09T11:21:34.434721Z | 2024-10-09T11:21:34.434721Z |
| ncsc-2024-0402 | Kwetsbaarheden verholpen in Adobe Commerce en Magento | 2024-10-09T13:38:09.912496Z | 2024-10-09T13:38:09.912496Z |
| ncsc-2024-0403 | Kwetsbaarheid verholpen in Mozilla Firefox | 2024-10-10T07:20:38.171954Z | 2024-10-10T07:20:38.171954Z |
| ncsc-2024-0404 | Kwetsbaarheden verholpen in Juniper JunOS en JunOS Evolved | 2024-10-10T11:19:54.515278Z | 2024-10-10T11:19:54.515278Z |
| ncsc-2024-0405 | Kwetsbaarheden verholpen in Palo Alto Expedition | 2024-10-10T12:02:12.890277Z | 2024-10-10T12:02:12.890277Z |
| ncsc-2024-0386 | Kwetsbaarheden verholpen in Zimbra | 2024-10-02T07:02:43.365395Z | 2024-10-10T12:50:25.238470Z |
| ncsc-2024-0398 | Kwetsbaarheden verholpen in Ivanti Connect Secure en Policy Secure | 2024-10-09T09:47:33.556285Z | 2024-10-11T07:03:14.760313Z |
| ncsc-2024-0406 | Kwetsbaarheden verholpen in Gitlab Enterprise Edition en Community Edition | 2024-10-11T08:23:31.975727Z | 2024-10-11T08:23:31.975727Z |
| ncsc-2024-0359 | Kwetsbaarheden verholpen in diverse producten van Veeam. | 2024-09-06T08:01:04.558202Z | 2024-10-11T09:18:53.784374Z |
| ncsc-2024-0407 | Kwetsbaarheden verholpen in Moxa systemen | 2024-10-14T12:14:38.572540Z | 2024-10-14T12:14:38.572540Z |
| ncsc-2024-0408 | Kwetsbaarheden verholpen in Splunk Enterprise | 2024-10-15T15:18:24.694416Z | 2024-10-15T15:18:24.694416Z |
| ncsc-2024-0409 | Kwetsbaarheid verholpen in Solarwinds Web Helpdesk | 2024-10-17T06:08:32.057774Z | 2024-10-17T06:08:32.057774Z |
| ncsc-2024-0410 | Kwetsbaarheden verholpen in Solarwinds Platform | 2024-10-17T06:09:32.053449Z | 2024-10-17T06:09:32.053449Z |
| ncsc-2024-0411 | Kwetsbaarheden verholpen in Oracle Database producten | 2024-10-17T13:15:19.595269Z | 2024-10-17T13:15:19.595269Z |
| ncsc-2024-0412 | Kwetsbaarheden verholpen in Oracle Peoplesoft | 2024-10-17T13:16:18.175855Z | 2024-10-17T13:16:18.175855Z |
| ncsc-2024-0413 | Kwetsbaarheden verholpen in Oracle Commerce | 2024-10-17T13:17:19.736602Z | 2024-10-17T13:17:19.736602Z |
| ncsc-2024-0414 | Kwetsbaarheden verholpen in Oracle Communications | 2024-10-17T13:17:52.103171Z | 2024-10-17T13:17:52.103171Z |
| ncsc-2024-0415 | Kwetsbaarheden verholpen in Oracle Enterprise Manager | 2024-10-17T13:18:06.611153Z | 2024-10-17T13:18:06.611153Z |
| ncsc-2024-0416 | Kwetsbaarheden verholpen in Oracle Financial Services Applications | 2024-10-17T13:18:45.385015Z | 2024-10-17T13:18:45.385015Z |
| ncsc-2024-0417 | Kwetsbaarheden verholpen in Oracle Fusion Middleware | 2024-10-17T13:19:16.185510Z | 2024-10-17T13:19:16.185510Z |
| ncsc-2024-0418 | Kwetsbaarheden verholpen in Oracle Analytics | 2024-10-17T13:19:50.583299Z | 2024-10-17T13:19:50.583299Z |
| ncsc-2024-0419 | Kwetsbaarheden verholpen in Oracle Java | 2024-10-17T13:20:07.759085Z | 2024-10-17T13:20:07.759085Z |
| ncsc-2024-0420 | Kwetsbaarheden verholpen in Oracle MySQL | 2024-10-17T13:20:42.437738Z | 2024-10-17T13:20:42.437738Z |
| ncsc-2024-0421 | Kwetsbaarheden verholpen in SolarWinds Serv-U | 2024-10-18T09:10:48.856424Z | 2024-10-18T09:10:48.856424Z |
| ncsc-2024-0422 | Kwetsbaarheden verholpen in Oracle E-Business Suite | 2024-10-18T09:26:29.690794Z | 2024-10-18T09:26:29.690794Z |
| ncsc-2024-0424 | Kwetsbaarheden verholpen in Cisco Adaptive Security Appliance en Firepower Threat Defense | 2024-10-24T08:37:15.013231Z | 2024-10-24T08:37:15.013231Z |
| ncsc-2024-0425 | Kwetsbaarheden verholpen in Mozilla Firefox en Thunderbird | 2024-10-30T10:53:07.348476Z | 2024-10-30T10:53:07.348476Z |
| ncsc-2024-0426 | Kwetsbaarheden verholpen in Apple MacOS | 2024-10-30T11:26:13.535716Z | 2024-10-30T11:26:13.535716Z |
| ncsc-2024-0427 | Kwetsbaarheden verholpen in Google Chrome | 2024-10-30T11:36:05.615865Z | 2024-10-30T11:36:05.615865Z |
| ncsc-2024-0428 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2024-10-30T11:39:26.910666Z | 2024-10-30T11:39:26.910666Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-439148 | SSA-439148: File Parsing Vulnerabilities in PADS Standard/Plus Viewer | 2022-07-12T00:00:00Z | 2022-07-12T00:00:00Z |
| ssa-474231 | SSA-474231: File Parsing Vulnerability in Simcenter Femap before V2022.2 | 2022-07-12T00:00:00Z | 2022-07-12T00:00:00Z |
| ssa-491621 | SSA-491621: Denial of Service Vulnerability in CPC80 Firmware of SICAM A8000 Devices | 2022-07-12T00:00:00Z | 2022-07-12T00:00:00Z |
| ssa-492173 | SSA-492173: Expression Injection Vulnerability in Mendix Applications | 2022-07-12T00:00:00Z | 2022-07-12T00:00:00Z |
| ssa-557804 | SSA-557804: Mirror Port Isolation Vulnerability in SCALANCE X Switches | 2019-03-12T00:00:00Z | 2022-07-12T00:00:00Z |
| ssa-599506 | SSA-599506: Command Injection Vulnerability in RUGGEDCOM ROX | 2022-07-12T00:00:00Z | 2022-07-12T00:00:00Z |
| ssa-610768 | SSA-610768: XML Entity Expansion Injection Vulnerability in Mendix Excel Importer Module | 2022-07-12T00:00:00Z | 2022-07-12T00:00:00Z |
| ssa-711829 | SSA-711829: Denial of Service Vulnerability in TIA Administrator | 2022-04-12T00:00:00Z | 2022-07-12T00:00:00Z |
| ssa-865333 | SSA-865333: Memory Corruption Vulnerability in EN100 Ethernet Module | 2022-07-12T00:00:00Z | 2022-07-12T00:00:00Z |
| ssa-910883 | SSA-910883: DHCP Client Vulnerability in SINAMICS PERFECT HARMONY GH180 Drives | 2022-07-12T00:00:00Z | 2022-07-12T00:00:00Z |
| ssa-944952 | SSA-944952: Authentication Bypass Vulnerability in Opcenter Quality | 2022-07-12T00:00:00Z | 2022-07-12T00:00:00Z |
| ssa-185638 | SSA-185638: Authentication Bypass Vulnerability in SICAM A8000 Web Server Module | 2022-08-09T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-220589 | SSA-220589: Hard Coded Default Credential Vulnerability in Teamcenter | 2022-06-14T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-232418 | SSA-232418: Vulnerabilities in SIMATIC S7-1200 and SIMATIC S7-1500 CPU Families | 2019-08-13T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-492828 | SSA-492828: Denial-of-Service Vulnerability in SIMATIC S7-300 CPUs and SINUMERIK Controller | 2020-11-10T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-555707 | SSA-555707: Information Disclosure Vulnerability in Simcenter STAR-CCM+ | 2022-08-09T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-580125 | SSA-580125: Multiple Vulnerabilities in SIMATIC eaSie | 2022-07-12T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-629512 | SSA-629512: Local Privilege Escalation Vulnerability in TIA Portal | 2020-01-14T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-661034 | SSA-661034: Incorrect Permission Assignment in Multiple SIMATIC Software Products | 2021-07-13T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-669737 | SSA-669737: Improper Access Control Vulnerability in SICAM TOOLBOX II | 2022-02-08T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-732250 | SSA-732250: Libcurl Vulnerabilities in Industrial Devices | 2022-05-10T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-759952 | SSA-759952: Command Injection and Denial of Service Vulnerability in Teamcenter | 2022-08-09T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-789162 | SSA-789162: Vulnerabilities in Teamcenter | 2022-05-10T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-914168 | SSA-914168: Multiple Vulnerabilities in SIMATIC WinCC Affecting Other SIMATIC Software Products | 2022-02-08T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-243317 | SSA-243317 File Parsing Vulnerability in Simcenter Femap and Parasolid | 2022-07-12T00:00:00Z | 2022-09-13T00:00:00Z |
| ssa-518824 | SSA-518824 Multiple File Parsing Vulnerabilities in Simcenter Femap and Parasolid | 2022-09-13T00:00:00Z | 2022-09-13T00:00:00Z |
| ssa-637483 | SSA-637483 Third-Party Component Vulnerabilities in SINEC INS before V1.0 SP2 | 2022-09-13T00:00:00Z | 2022-09-13T00:00:00Z |
| ssa-254054 | SSA-254054: Spring Framework Vulnerability (Spring4Shell or SpringShell, CVE-2022-22965) - Impact to Siemens Products | 2022-04-19T00:00:00Z | 2022-10-11T00:00:00Z |
| ssa-258115 | SSA-258115: DWG File Parsing Vulnerability in Solid Edge before SE2022MP9 | 2022-10-11T00:00:00Z | 2022-10-11T00:00:00Z |
| ssa-280624 | SSA-280624: Multiple Vulnerabilities in SCALANCE W1750D | 2021-10-12T00:00:00Z | 2022-10-11T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2011_0373 | Red Hat Security Advisory: firefox security update | 2011-03-22T21:07:00+00:00 | 2024-11-05T17:28:43+00:00 |
| rhsa-2011_0374 | Red Hat Security Advisory: thunderbird security and bug fix update | 2011-03-22T21:07:00+00:00 | 2024-11-05T17:28:48+00:00 |
| rhsa-2011_0375 | Red Hat Security Advisory: seamonkey security update | 2011-03-22T20:47:00+00:00 | 2024-11-05T17:28:53+00:00 |
| rhsa-2011_0472 | Red Hat Security Advisory: nss security update | 2011-04-29T02:57:00+00:00 | 2024-11-05T17:30:18+00:00 |
| rhsa-2011_1111 | Red Hat Security Advisory: Red Hat Enterprise Linux Extended Update Support 5.4 - End Of Life | 2011-08-01T15:47:00+00:00 | 2024-11-05T17:34:20+00:00 |
| rhsa-2011_1239 | Red Hat Security Advisory: Red Hat Enterprise Linux Extended Update Support 4.7 - End Of Life | 2011-08-31T19:21:00+00:00 | 2024-11-05T17:34:42+00:00 |
| rhsa-2011_1240 | Red Hat Security Advisory: Red Hat Enterprise Linux 4 - 6-Month End Of Life Notice | 2011-08-31T19:23:00+00:00 | 2024-11-05T17:34:47+00:00 |
| rhsa-2011_1242 | Red Hat Security Advisory: firefox security update | 2011-08-31T20:04:00+00:00 | 2024-11-05T17:34:56+00:00 |
| rhsa-2011_1243 | Red Hat Security Advisory: thunderbird security update | 2011-08-31T19:58:00+00:00 | 2024-11-05T17:35:06+00:00 |
| rhsa-2011_1244 | Red Hat Security Advisory: seamonkey security update | 2011-08-31T20:14:00+00:00 | 2024-11-05T17:35:09+00:00 |
| rhsa-2011_1266 | Red Hat Security Advisory: seamonkey security update | 2011-09-06T21:19:00+00:00 | 2024-11-05T17:35:24+00:00 |
| rhsa-2011_1248 | Red Hat Security Advisory: ca-certificates security update | 2011-09-02T11:47:00+00:00 | 2024-11-05T17:35:25+00:00 |
| rhsa-2011_1267 | Red Hat Security Advisory: thunderbird security update | 2011-09-06T21:36:00+00:00 | 2024-11-05T17:35:28+00:00 |
| rhsa-2011_1268 | Red Hat Security Advisory: firefox security update | 2011-09-06T22:15:00+00:00 | 2024-11-05T17:35:34+00:00 |
| rhsa-2011_1282 | Red Hat Security Advisory: nss and nspr security update | 2011-09-12T18:59:00+00:00 | 2024-11-05T17:35:40+00:00 |
| rhsa-2011_1444 | Red Hat Security Advisory: nss security update | 2011-11-09T13:10:00+00:00 | 2024-11-05T17:38:25+00:00 |
| rhsa-2011_1506 | Red Hat Security Advisory: Red Hat Enterprise Linux 4 - 3-Month End Of Life Notice | 2011-12-01T16:26:00+00:00 | 2024-11-05T17:38:39+00:00 |
| rhsa-2011_1819 | Red Hat Security Advisory: dhcp security update | 2011-12-14T18:51:00+00:00 | 2024-11-05T17:39:25+00:00 |
| rhsa-2012_0073 | Red Hat Security Advisory: Red Hat Enterprise Linux 4 - 30 day End Of Life Notice | 2012-01-31T19:43:00+00:00 | 2024-11-05T17:41:16+00:00 |
| rhsa-2012_0099 | Red Hat Security Advisory: MRG Grid security, bug fix, and enhancement update | 2012-02-06T18:17:00+00:00 | 2024-11-05T17:41:34+00:00 |
| rhsa-2012_0349 | Red Hat Security Advisory: Red Hat Enterprise Linux 4 - Transition to Extended Life Phase Notice | 2012-03-01T15:06:00+00:00 | 2024-11-05T17:43:45+00:00 |
| rhsa-2012_0532 | Red Hat Security Advisory: nss security update | 2012-04-30T17:07:00+00:00 | 2024-11-05T17:45:18+00:00 |
| rhsa-2012_0973 | Red Hat Security Advisory: nss, nss-util, and nspr security, bug fix, and enhancement update | 2012-06-19T15:23:00+00:00 | 2024-11-05T17:47:42+00:00 |
| rhsa-2012_1015 | Red Hat Security Advisory: Red Hat Enterprise Linux Extended Update Support 6.0 6-Month EOL Notice | 2012-06-19T19:25:00+00:00 | 2024-11-05T17:47:56+00:00 |
| rhsa-2012_1417 | Red Hat Security Advisory: Red Hat Enterprise Linux Extended Update Support 6.0 1-Month EOL Notice | 2012-10-30T17:11:00+00:00 | 2024-11-05T17:52:59+00:00 |
| rhsa-2012_1511 | Red Hat Security Advisory: Red Hat Enterprise Linux Extended Update Support 6.1 6-Month EOL Notice | 2012-11-29T18:35:00+00:00 | 2024-11-05T17:54:12+00:00 |
| rhsa-2012_1546 | Red Hat Security Advisory: RHN Satellite Server 5 on Red Hat Enterprise Linux 4 - End Of Life | 2012-12-05T17:37:00+00:00 | 2024-11-05T17:54:18+00:00 |
| rhsa-2012_1514 | Red Hat Security Advisory: Red Hat Enterprise Linux Extended Update Support 6.0 - End Of Life | 2012-12-03T17:57:00+00:00 | 2024-11-05T17:54:21+00:00 |
| rhsa-2012_1547 | Red Hat Security Advisory: RHN Proxy Server 5 on Red Hat Enterprise Linux 4 - End Of Life | 2012-12-05T17:38:00+00:00 | 2024-11-05T17:54:23+00:00 |
| rhsa-2012_1577 | Red Hat Security Advisory: java-1.4.2-ibm-sap End of Support Notice | 2012-12-17T20:59:00+00:00 | 2024-11-05T17:55:22+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-18-032-02 | 3S-Smart Software Solutions GmbH CODESYS Web Server | 2018-02-01T00:00:00.000000Z | 2018-02-01T00:00:00.000000Z |
| icsa-18-032-03 | Gemalto Sentinel License Manager | 2018-02-01T00:00:00.000000Z | 2018-02-01T00:00:00.000000Z |
| icsma-18-037-01 | Vyaire Medical CareFusion Upgrade Utility Vulnerability | 2018-02-06T00:00:00.000000Z | 2018-02-06T00:00:00.000000Z |
| icsa-18-044-01 | WAGO PFC200 Series | 2018-02-13T00:00:00.000000Z | 2018-02-13T00:00:00.000000Z |
| icsa-18-044-02 | Schneider Electric IGSS SCADA Software | 2018-02-13T00:00:00.000000Z | 2018-02-13T00:00:00.000000Z |
| icsa-17-318-02a | ABB TropOS (Update A) | 2017-11-14T00:00:00.000000Z | 2018-02-15T00:00:00.000000Z |
| icsa-18-046-01 | Nortek Linear eMerge E3 Series | 2018-02-15T00:00:00.000000Z | 2018-02-15T00:00:00.000000Z |
| icsa-18-046-02 | GE D60 Line Distance Relay | 2018-02-15T00:00:00.000000Z | 2018-02-15T00:00:00.000000Z |
| icsa-18-046-03 | Schneider Electric IGSS Mobile | 2018-02-15T00:00:00.000000Z | 2018-02-15T00:00:00.000000Z |
| icsa-18-046-04 | Schneider Electric StruxureOn Gateway | 2018-02-15T00:00:00.000000Z | 2018-02-15T00:00:00.000000Z |
| icsa-18-051-01 | ABB netCADOPS Web Application | 2018-02-20T00:00:00.000000Z | 2018-02-20T00:00:00.000000Z |
| icsa-18-018-01a | ICSA-18-018-01A Siemens SIMATIC WinCC Add-On (Update A) | 2018-01-18T00:00:00.000000Z | 2018-02-22T00:00:00.000000Z |
| icsa-18-058-02 | Delta Electronics WPLSoft | 2018-02-27T00:00:00.000000Z | 2018-02-27T00:00:00.000000Z |
| icsa-18-058-03 | Emerson ControlWave Micro Process Automation Controller | 2018-02-27T00:00:00.000000Z | 2018-02-27T00:00:00.000000Z |
| icsma-18-058-02 | Philips Intellispace Portal ISP Vulnerabilities | 2018-02-27T00:00:00.000000Z | 2018-02-27T00:00:00.000000Z |
| icsa-18-060-02 | Moxa OnCell G3100-HSPA Series | 2018-03-01T00:00:00.000000Z | 2018-03-01T00:00:00.000000Z |
| icsa-18-060-03 | Delta Electronics Delta Industrial Automation DOPSoft | 2018-03-01T00:00:00.000000Z | 2018-03-01T00:00:00.000000Z |
| icsa-18-065-01 | Hirschmann Automation and Control GmbH Classic Platform Switches | 2018-03-06T00:00:00.000000Z | 2018-03-06T00:00:00.000000Z |
| icsa-18-065-02 | Schneider Electric SoMove Software and DTM Software Components | 2018-03-06T00:00:00.000000Z | 2018-03-06T00:00:00.000000Z |
| icsa-18-065-03 | Eaton ELCSoft | 2018-03-06T00:00:00.000000Z | 2018-03-06T00:00:00.000000Z |
| icsa-18-072-02 | OSIsoft PI Data Archive | 2018-03-13T00:00:00.000000Z | 2018-03-13T00:00:00.000000Z |
| icsa-18-072-03 | OSIsoft PI Vision | 2018-03-13T00:00:00.000000Z | 2018-03-13T00:00:00.000000Z |
| icsa-18-072-04 | OSIsoft PI Web API | 2018-03-13T00:00:00.000000Z | 2018-03-13T00:00:00.000000Z |
| icsma-18-037-02 | GE Medical Devices Vulnerability | 2018-02-06T00:00:00.000000Z | 2018-03-13T00:00:00.000000Z |
| icsa-18-079-01 | Geutebruck IP Cameras | 2018-03-20T00:00:00.000000Z | 2018-03-20T00:00:00.000000Z |
| icsa-18-081-01 | ICSA-18-081-01 Siemens SIMATIC WinCC OA UI Mobile App | 2018-03-20T00:00:00.000000Z | 2018-03-20T00:00:00.000000Z |
| icsa-18-081-02 | Beckhoff TwinCAT | 2018-03-22T00:00:00.000000Z | 2018-03-22T00:00:00.000000Z |
| icsa-18-086-01 | Schneider Electric Modicon Premium, Modicon Quantum, Modicon M340, and Modicon BMXNOR0200 | 2018-03-27T00:00:00.000000Z | 2018-03-27T00:00:00.000000Z |
| icsa-18-088-01 | WAGO 750 Series | 2018-03-29T00:00:00.000000Z | 2018-03-29T00:00:00.000000Z |
| icsa-18-093-01 | ICSA-18-093-01 Siemens Building Technologies Products (Update A) | 2018-03-28T00:00:00.000000Z | 2018-04-03T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-20180516-dna2 | Cisco Digital Network Architecture Center Authentication Bypass Vulnerability | 2018-05-16T16:00:00+00:00 | 2018-05-16T16:00:00+00:00 |
| cisco-sa-20180516-dnac | Cisco Digital Network Architecture Center Static Credentials Vulnerability | 2018-05-16T16:00:00+00:00 | 2018-05-16T16:00:00+00:00 |
| cisco-sa-20180516-firepwr-pb | Cisco Firepower Threat Defense Software Policy Bypass Vulnerability | 2018-05-16T16:00:00+00:00 | 2018-05-16T16:00:00+00:00 |
| cisco-sa-20180516-fnd | Cisco IoT Field Network Director Cross-Site Request Forgery Vulnerability | 2018-05-16T16:00:00+00:00 | 2018-05-16T16:00:00+00:00 |
| cisco-sa-20180516-ident-se-xss | Cisco Identity Services Engine Cross-Site Scripting Vulnerability | 2018-05-16T16:00:00+00:00 | 2018-05-16T16:00:00+00:00 |
| cisco-sa-20180516-ise-xss | Cisco Identity Services Engine Logs Cross-Site Scripting Vulnerability | 2018-05-16T16:00:00+00:00 | 2018-05-16T16:00:00+00:00 |
| cisco-sa-20180516-msms | Cisco Meeting Server Media Services Denial of Service Vulnerability | 2018-05-16T16:00:00+00:00 | 2018-05-16T16:00:00+00:00 |
| cisco-sa-20180516-nfvis | Cisco Enterprise NFV Infrastructure Software Linux Shell Access Vulnerability | 2018-05-16T16:00:00+00:00 | 2018-05-16T16:00:00+00:00 |
| cisco-sa-20180516-socmin-dos | Cisco SocialMiner Notification System Denial of Service Vulnerability | 2018-05-16T16:00:00+00:00 | 2018-05-16T16:00:00+00:00 |
| cisco-sa-20180516-nfvis-cli-command-injection | Cisco Enterprise NFV Infrastructure Software CLI Command Injection Vulnerability | 2018-05-16T16:00:00+00:00 | 2018-05-16T17:46:00+00:00 |
| cisco-sa-20180516-nfvis-path-traversal | Cisco Enterprise NFV Infrastructure Software Web Management Interface Path Traversal Vulnerability | 2018-05-16T16:00:00+00:00 | 2018-05-16T18:05:00+00:00 |
| cisco-sa-20180129-asa1 | Cisco Adaptive Security Appliance Remote Code Execution and Denial of Service Vulnerability | 2018-01-29T17:00:00+00:00 | 2018-05-17T17:52:00+00:00 |
| cisco-sa-20180516-cucm-cup-xss | Cisco Unified Communications Manager and Cisco Unified Presence Cross-Site Scripting Vulnerability | 2018-05-16T16:00:00+00:00 | 2018-05-18T15:35:00+00:00 |
| cisco-sa-20180606-AnyConnect-cert-bypass | Cisco AnyConnect Secure Mobility Client Certificate Bypass Vulnerability | 2018-06-06T16:00:00+00:00 | 2018-06-06T16:00:00+00:00 |
| cisco-sa-20180606-FireSIGHT-vpn-bypass | Cisco FireSIGHT System VPN Policy Bypass Vulnerability | 2018-06-06T16:00:00+00:00 | 2018-06-06T16:00:00+00:00 |
| cisco-sa-20180606-anyconnect-cert-bypass | Cisco AnyConnect Secure Mobility Client Certificate Bypass Vulnerability | 2018-06-06T16:00:00+00:00 | 2018-06-06T16:00:00+00:00 |
| cisco-sa-20180606-cpcp-id | Cisco Prime Collaboration Provisioning Cleartext Passwords Written to World-Readable File Vulnerability | 2018-06-06T16:00:00+00:00 | 2018-06-06T16:00:00+00:00 |
| cisco-sa-20180606-cuc-xss | Cisco Unity Connection Cross-Site Scripting Vulnerability | 2018-06-06T16:00:00+00:00 | 2018-06-06T16:00:00+00:00 |
| cisco-sa-20180606-cucm-xfs | Cisco Unified Communications Manager Cross-Frame Scripting Vulnerability | 2018-06-06T16:00:00+00:00 | 2018-06-06T16:00:00+00:00 |
| cisco-sa-20180606-firesight-vpn-bypass | Cisco FireSIGHT System VPN Policy Bypass Vulnerability | 2018-06-06T16:00:00+00:00 | 2018-06-06T16:00:00+00:00 |
| cisco-sa-20180606-ise-xss | Cisco Identity Services Engine Cross-Site Scripting Vulnerability | 2018-06-06T16:00:00+00:00 | 2018-06-06T16:00:00+00:00 |
| cisco-sa-20180606-multiplatform-sip | Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Session Initiation Protocol Denial of Service Vulnerability | 2018-06-06T16:00:00+00:00 | 2018-06-06T16:00:00+00:00 |
| cisco-sa-20180606-nso | Cisco Network Services Orchestrator Arbitrary Command Execution Vulnerability | 2018-06-06T16:00:00+00:00 | 2018-06-06T16:00:00+00:00 |
| cisco-sa-20180606-prime-access | Cisco Prime Collaboration Provisioning Access Control Vulnerability | 2018-06-06T16:00:00+00:00 | 2018-06-06T16:00:00+00:00 |
| cisco-sa-20180606-prime-bypass | Cisco Prime Collaboration Provisioning Access Control Bypass Vulnerability | 2018-06-06T16:00:00+00:00 | 2018-06-06T16:00:00+00:00 |
| cisco-sa-20180606-prime-escalation | Cisco Prime Collaboration Provisioning Access Control Deficiency in Batch Function Privilege Escalation Vulnerability | 2018-06-06T16:00:00+00:00 | 2018-06-06T16:00:00+00:00 |
| cisco-sa-20180606-prime-password-recovery | Cisco Prime Collaboration Provisioning Unauthorized Password Recovery Vulnerability | 2018-06-06T16:00:00+00:00 | 2018-06-06T16:00:00+00:00 |
| cisco-sa-20180606-prime-password-reset | Cisco Prime Collaboration Provisioning Unauthorized Password Reset Vulnerability | 2018-06-06T16:00:00+00:00 | 2018-06-06T16:00:00+00:00 |
| cisco-sa-20180606-prime-rmi | Cisco Prime Collaboration Provisioning Unauthenticated Remote Method Invocation Vulnerability | 2018-06-06T16:00:00+00:00 | 2018-06-06T16:00:00+00:00 |
| cisco-sa-20180606-prime-sql | Cisco Prime Collaboration Provisioning SQL Injection Vulnerability | 2018-06-06T16:00:00+00:00 | 2018-06-06T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2019-12735 | getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline as demonstrated by execute in Vim and assert_fails or nvim_input in Neovim. | 2019-06-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2019-15845 | Ruby through 2.4.7 2.5.x through 2.5.6 and 2.6.x through 2.6.4 mishandles path checking within File.fnmatch functions. | 2019-11-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2019-16201 | WEBrick::HTTPAuth::DigestAuth in Ruby through 2.4.7 2.5.x through 2.5.6 and 2.6.x through 2.6.4 has a regular expression Denial of Service cause by looping/backtracking. A victim must expose a WEBrick server that uses DigestAuth to the Internet or a untrusted network. | 2019-11-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2019-16254 | Ruby through 2.4.7 2.5.x through 2.5.6 and 2.6.x through 2.6.4 allows HTTP Response Splitting. If a program using WEBrick inserts untrusted input into the response header an attacker can exploit it to insert a newline character to split a header and inject malicious content to deceive clients. NOTE: this issue exists because of an incomplete fix for CVE-2017-17742 which addressed the CRLF vector but did not address an isolated CR or an isolated LF. | 2019-11-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2019-16255 | Ruby through 2.4.7 2.5.x through 2.5.6 and 2.6.x through 2.6.4 allows code injection if the first argument (aka the "command" argument) to Shell#[] or Shell#test in lib/shell.rb is untrusted data. An attacker can exploit this to call an arbitrary Ruby method. | 2019-11-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2019-16905 | OpenSSH 7.7 through 7.9 and 8.x before 8.1 when compiled with an experimental key type has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions and there is no supported way to enable it when building portable OpenSSH. | 2019-10-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2019-19126 | On the x86-64 architecture the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition allowing local attackers to restrict the possible mapping addresses for loaded libraries and thus bypass ASLR for a setuid program. | 2019-11-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2019-19338 | A flaw was found in the fix for CVE-2019-11135 in the Linux upstream kernel versions before 5.5 where the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0) but is not affected by the MDS issue (MDS_NO=1) the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has 'TSX' enabled. Confidentiality of data is the highest threat associated with this vulnerability. | 2020-07-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2019-20079 | The autocmd feature in window.c in Vim before 8.1.2136 accesses freed memory. | 2019-12-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2019-20372 | NGINX before 1.17.7 with certain error_page configurations allows HTTP request smuggling as demonstrated by the ability of an attacker to read unauthorized web pages in environments where NGINX is being fronted by a load balancer. | 2020-01-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2019-20794 | An issue was discovered in the Linux kernel 4.18 through 5.6.11 when unprivileged user namespaces are allowed. A user can create their own PID namespace and mount a FUSE filesystem. Upon interaction with this FUSE filesystem if the userspace component is terminated via a kill of the PID namespace's pid 1 it will result in a hung task and resources being permanently locked up until system reboot. This can result in resource exhaustion. | 2020-05-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2019-20807 | In Vim before 8.1.0881 users can circumvent the rvim restricted mode and execute arbitrary OS commands via scripting interfaces (e.g. Python Ruby or Lua). | 2020-05-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2019-20810 | go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path which causes a memory leak aka CID-9453264ef586. | 2020-06-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2019-3886 | An incorrect permissions check was discovered in libvirt 4.8.0 and above. The readonly permission was allowed to invoke APIs depending on the guest agent which could lead to potentially disclosing unintended information or denial of service by causing libvirt to block. | 2019-04-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2019-6488 | The string component in the GNU C Library (aka glibc or libc6) through 2.28 when running on the x32 architecture incorrectly attempts to use a 64-bit register for size_t in assembly codes which can lead to a segmentation fault or possibly unspecified other impact as demonstrated by a crash in __memmove_avx_unaligned_erms in sysdeps/x86_64/multiarch/memmove-vec-unaligned-erms.S during a memcpy. | 2019-01-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2019-9070 | An issue was discovered in GNU libiberty as distributed in GNU Binutils 2.32. It is a heap-based buffer over-read in d_expression_1 in cp-demangle.c after many recursive calls. | 2019-02-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2020-10690 | There is a use-after-free in kernel versions before 5.5 due to a race condition between the release of ptp_clock and cdev while resource deallocation. When a (high privileged) process allocates a ptp device file (like /dev/ptpX) and voluntarily goes to sleep. During this time if the underlying device is removed it can cause an exploitable condition as the process wakes up to terminate and clean all attached files. The system crashes due to the cdev structure being invalid (as already freed) which is pointed to by the inode. | 2020-05-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2020-10711 | A NULL pointer dereference flaw was found in the Linux kernel's SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. While processing the CIPSO restricted bitmap tag in the 'cipso_v4_parsetag_rbm' routine it sets the security attribute to indicate that the category bitmap is present even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel resulting in a denial of service. | 2020-05-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2020-10733 | The Windows installer for PostgreSQL 9.5 - 12 invokes system-provided executables that do not have fully-qualified paths. Executables in the directory where the installer loads or the current working directory take precedence over the intended executables. An attacker having permission to add files into one of those directories can use this to execute arbitrary code with the installer's administrative rights. | 2020-09-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2020-10757 | A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system. | 2020-06-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2020-10766 | A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality. | 2020-09-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2020-10767 | A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality. | 2020-09-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2020-10768 | A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being 'force disabled' when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality. | 2020-09-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2020-10781 | A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes possibly making the system inoperable. | 2020-09-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2020-10933 | An issue was discovered in Ruby 2.5.x through 2.5.7 2.6.x through 2.6.5 and 2.7.0. If a victim calls BasicSocket#read_nonblock(requested_size buffer exception: false) the method resizes the buffer to fit the requested size but no data is copied. Thus the buffer string provides the previous value of the heap. This may expose possibly sensitive data from the interpreter. | 2020-05-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2020-10942 | In the Linux kernel before 5.5.8 get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field which might allow attackers to trigger kernel stack corruption via crafted system calls. | 2020-03-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2020-11608 | An issue was discovered in the Linux kernel before 5.6.1. drivers/media/usb/gspca/ov519.c allows NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints aka CID-998912346c0d. | 2020-04-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2020-11609 | An issue was discovered in the stv06xx subsystem in the Linux kernel before 5.6.1. drivers/media/usb/gspca/stv06xx/stv06xx.c and drivers/media/usb/gspca/stv06xx/stv06xx_pb0100.c mishandle invalid descriptors as demonstrated by a NULL pointer dereference aka CID-485b06aadb93. | 2020-04-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2020-11668 | In the Linux kernel before 5.6.1 drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors aka CID-a246b4d54770. | 2020-04-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2020-12464 | usb_sg_cancel in drivers/usb/core/message.c in the Linux kernel before 5.6.8 has a use-after-free because a transfer occurs without a reference aka CID-056ad39ee925. | 2020-04-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-202011-1571 | Beijing Wenwang Yilian Technology Co., Ltd. is a leading provider of network environment … | 2022-05-04T08:33:45.623000Z |
| var-202011-1593 | EPON RL821GWV is a router. Technxt EPON RL821GWV has an information disclosure vulner… | 2022-05-04T08:33:45.612000Z |
| var-202011-1276 | A CWE-326: Inadequate Encryption Strength vulnerability exists in Modicon M221 (all refer… | 2022-05-04T08:33:46.177000Z |
| var-202011-1277 | A CWE-334: Small Space of Random Values vulnerability exists in Modicon M221 (all referen… | 2022-05-04T08:33:46.015000Z |
| var-202011-1278 | A CWE-311: Missing Encryption of Sensitive Data vulnerability exists in Modicon M221 (all… | 2022-05-04T08:33:46.040000Z |
| var-202011-1279 | A CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability exist… | 2022-05-04T08:33:46.095000Z |
| var-202012-0814 | A CWE-760: Use of a One-Way Hash with a Predictable Salt vulnerability exists in Modicon … | 2022-05-04T08:33:46.147000Z |
| var-202010-1601 | New H3C Technology Co., Ltd. is committed to becoming the most reliable partner for custo… | 2022-05-04T08:33:51.837000Z |
| var-202010-1622 | CyberControl is a flexible and customizable automated monitoring software platform that c… | 2022-05-04T08:33:51.827000Z |
| var-202010-1643 | C2000-B2-SFE0101-BB1 is a serial device networking server. It provides data transmission … | 2022-05-04T08:33:51.816000Z |
| var-202009-1671 | Shenzhen Xing Fusion Technology Co., Ltd. was established in July 2018. The company's bus… | 2022-05-04T08:33:54.991000Z |
| var-202009-1692 | TP-LINK Technology Co., Ltd. (hereinafter referred to as "TP-LINK") is a global network c… | 2022-05-04T08:33:54.980000Z |
| var-202009-1125 | A vulnerability in the PROFINET feature of Cisco IOS Software and Cisco IOS XE Software c… | 2022-05-04T08:33:56.714000Z |
| var-202007-1499 | KingView (KingView) is an industrial automation configuration software produced by Beijin… | 2022-05-04T08:34:08.612000Z |
| var-202006-1902 | Haiwell cloud configuration software Cloud SCADA is a .NET Framework-based industrial aut… | 2022-05-04T08:34:18.934000Z |
| var-202006-1923 | AC9V3.0 upgrade software is a Gigabit Ethernet wireless router of Shenzhen Jixiang Tengda… | 2022-05-04T08:34:18.921000Z |
| var-202005-1070 | D-Link Dir-816 is a wireless router. D-Link DIR-816 has a command execution vulnerabi… | 2022-05-04T08:34:28.135000Z |
| var-202005-1091 | Codesys is a powerful PLC software programming tool. Codesys v3 has a denial of servi… | 2022-05-04T08:34:28.125000Z |
| var-202004-2239 | Shenzhen Hexin Automation Technology Co., Ltd. (referred to as "Hexin Technology") was es… | 2022-05-04T08:34:30.166000Z |
| var-202004-2260 | Shenzhen Dadian Technology Co., Ltd. is a company specializing in the research and develo… | 2022-05-04T08:34:30.156000Z |
| var-202002-1702 | The equipment room moving ring monitoring system is a monitoring function of the equipmen… | 2022-05-04T08:34:43.443000Z |
| var-202001-1957 | ZXR10 ZSR V2 series router is a next-generation intelligent access router product integra… | 2022-05-04T08:34:48.034000Z |
| var-202001-1978 | Wuxi Xinjie Electric Co., Ltd. is a well-known domestic company specializing in the devel… | 2022-05-04T08:34:48.022000Z |
| var-202001-0739 | The web interface on the Technicolor TC7230 STEB 01.25 is vulnerable to DNS rebinding, wh… | 2022-05-04T08:34:58.752000Z |
| var-201912-1997 | TP-Link Archer is a wireless router of China TP-Link company. The TP-Link Archer router … | 2022-05-04T08:35:02.659000Z |
| var-201911-1945 | Hikvision is a video-centric IoT solution provider, providing integrated security, smart … | 2022-05-04T08:35:13.659000Z |
| var-201912-0153 | IBM MQ and IBM MQ Appliance 9.1 CD, 9.1 LTS, 9.0 LTS, and 8.0 is vulnerable to a denial o… | 2022-05-04T08:35:13.396000Z |
| var-201910-1868 | Alibaba Cloud IoT platform is a cloud service platform for the IoT field. It communicates… | 2022-05-04T08:35:17.893000Z |
| var-201909-1669 | Sangfor Technology Co., Ltd. is a provider of products, services and solutions focusing o… | 2022-05-04T08:35:30.333000Z |
| var-201908-2203 | Xiamen Sixin Communication Technology Co., Ltd. is the research and development, producti… | 2022-05-04T08:35:36.677000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2007-000087 | CGI RESCUE WebFORM missing mail content vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000088 | Shopping Basket Professional vulnerable to OS command injection | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000090 | b2evolution cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000091 | Sleipnir RSS bar vulnerable in handling RSS data in an inappropriate security zone | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000093 | Sleipnir RSS bar vulnerable in handling RSS data in an inappropriate security zone | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000094 | MODx cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000127 | CCC Cleaner buffer overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000134 | Sage vulnerable to arbitrary script execution | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000135 | CCC Cleaner buffer overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000159 | Adobe JRun cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000160 | ColdFusion cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000161 | ColdFusion error page cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000165 | Ariel AirOne series cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000176 | Mozilla Firefox cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000199 | CCC Cleaner division-by-zero vulnerability when scanning UPX-packed executables | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000200 | Trac cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000215 | FENCE-Pro and Systemwalker Desktop Encryption self-decoding file vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000218 | Interstage Application Server cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000225 | NewsGlue and Ikinari Jijyoutsuu arbitrary script execution vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000227 | CruiseWorks and Minna De Office vulnerable in access restrictions | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000228 | MailDwarf cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000229 | MailDwarf vulnerability allows unauthorized sending of emails | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000236 | Overlay Weaver cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000259 | open-gorotto cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000260 | Shihonkanri Plus Ver2 GOOUT directory traversal vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000290 | InfoBarrier4 self-decrypted file vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000301 | Canon Network Camera Server VB100 Series vulnerable to cross-site scripting | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000322 | Lunascape RSS reader arbitrary script execution vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000395 | Homepage Builder sample CGI programs vulnerable to OS command injection | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000400 | Advance-Flow cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2015:0805-1 | Security update for cups-filters | 2015-03-13T12:25:45Z | 2015-03-13T12:25:45Z |
| suse-su-2015:0667-1 | Security update for libarchive | 2015-03-16T08:39:18Z | 2015-03-16T08:39:18Z |
| suse-su-2015:0491-1 | Security update for flash-player | 2015-03-16T09:30:35Z | 2015-03-16T09:30:35Z |
| suse-su-2015:0541-1 | Security update for openssl | 2015-03-18T14:19:20Z | 2015-03-18T14:19:20Z |
| suse-su-2015:0553-1 | Security update for compat-openssl098 | 2015-03-18T18:42:02Z | 2015-03-18T18:42:02Z |
| suse-su-2015:0553-2 | Security update for compat-openssl098 | 2015-03-18T18:42:03Z | 2015-03-18T18:42:03Z |
| suse-su-2015:0668-1 | Security update for libzip | 2015-03-20T13:26:32Z | 2015-03-20T13:26:32Z |
| suse-su-2015:0679-1 | Security update for tcpdump | 2015-03-20T14:25:34Z | 2015-03-20T14:25:34Z |
| suse-ru-2015:0335-1 | Security update for tcpdump | 2015-03-20T14:41:11Z | 2015-03-20T14:41:11Z |
| suse-su-2015:0692-1 | Security update for tcpdump | 2015-03-20T14:41:11Z | 2015-03-20T14:41:11Z |
| suse-su-2015:0836-1 | Security update for mercurial | 2015-03-20T15:26:35Z | 2015-03-20T15:26:35Z |
| suse-su-2015:0751-1 | Security update for mongodb | 2015-03-20T15:29:57Z | 2015-03-20T15:29:57Z |
| suse-su-2015:0702-1 | Security update for libXfont | 2015-03-20T15:39:51Z | 2015-03-20T15:39:51Z |
| suse-su-2015:0735-1 | Security update for gnutls | 2015-03-23T13:04:00Z | 2015-03-23T13:04:00Z |
| suse-su-2015:0834-1 | Security update for emacs | 2015-03-23T16:13:36Z | 2015-03-23T16:13:36Z |
| suse-su-2015:0817-1 | Security update for mercurial | 2015-03-23T17:10:44Z | 2015-03-23T17:10:44Z |
| suse-su-2015:0593-2 | Security update for MozillaFirefox | 2015-03-23T23:58:05Z | 2015-03-23T23:58:05Z |
| suse-su-2015:0593-1 | Security update for Mozilla Firefox | 2015-03-24T00:02:15Z | 2015-03-24T00:02:15Z |
| suse-su-2015:0866-1 | Security update for gd | 2015-03-24T16:10:35Z | 2015-03-24T16:10:35Z |
| suse-su-2015:0835-1 | Security update for gd | 2015-03-24T16:14:40Z | 2015-03-24T16:14:40Z |
| suse-su-2015:0630-1 | Security update for MozillaFirefox | 2015-03-24T17:10:32Z | 2015-03-24T17:10:32Z |
| suse-su-2015:0670-1 | Security update for pigz | 2015-03-24T17:18:12Z | 2015-03-24T17:18:12Z |
| suse-su-2015:0694-1 | Security update for python-Django | 2015-03-25T23:21:02Z | 2015-03-25T23:21:02Z |
| suse-su-2015:0658-1 | Security Update for Linux Kernel | 2015-03-26T17:36:44Z | 2015-03-26T17:36:44Z |
| suse-su-2015:0688-1 | Security update for webkitgtk | 2015-03-27T10:58:10Z | 2015-03-27T10:58:10Z |
| suse-su-2015:1109-1 | Security update for python-Django | 2015-03-30T09:04:33Z | 2015-03-30T09:04:33Z |
| suse-su-2015:1112-1 | Security update for python-Django | 2015-03-30T09:04:33Z | 2015-03-30T09:04:33Z |
| suse-su-2015:0745-1 | Security update for Xen | 2015-03-30T14:19:22Z | 2015-03-30T14:19:22Z |
| suse-su-2015:0746-1 | Security update for Xen | 2015-03-30T14:25:37Z | 2015-03-30T14:25:37Z |
| suse-su-2015:0747-1 | Security update for Xen | 2015-03-30T14:29:30Z | 2015-03-30T14:29:30Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2018:1058-1 | Security update for phpMyAdmin | 2018-04-23T21:35:19Z | 2018-04-23T21:35:19Z |
| opensuse-su-2018:1059-1 | Security update for phpMyAdmin | 2018-04-23T21:35:19Z | 2018-04-23T21:35:19Z |
| opensuse-su-2018:1051-1 | Security update for hdf5 | 2018-04-23T21:43:02Z | 2018-04-23T21:43:02Z |
| opensuse-su-2018:1056-1 | Security update for hdf5 | 2018-04-23T21:43:02Z | 2018-04-23T21:43:02Z |
| opensuse-su-2018:1265-1 | Security update for opencv | 2018-05-11T17:35:46Z | 2018-05-11T17:35:46Z |
| opensuse-su-2018:1271-1 | Security update for opencv | 2018-05-11T17:35:46Z | 2018-05-11T17:35:46Z |
| opensuse-su-2018:1329-1 | Security update for enigmail | 2018-05-17T11:35:48Z | 2018-05-17T11:35:48Z |
| opensuse-su-2018:1330-1 | Security update for enigmail | 2018-05-17T11:35:48Z | 2018-05-17T11:35:48Z |
| opensuse-su-2018:1175-1 | Security update for Chromium | 2018-05-27T11:26:33Z | 2018-05-27T11:26:33Z |
| opensuse-su-2018:1437-1 | Security update for Chromium | 2018-05-27T11:26:33Z | 2018-05-27T11:26:33Z |
| opensuse-su-2018:1462-1 | Security update for pdns | 2018-05-29T10:59:00Z | 2018-05-29T10:59:00Z |
| opensuse-su-2018:1859-1 | Security update for Opera | 2018-06-30T09:39:52Z | 2018-06-30T09:39:52Z |
| opensuse-su-2018:1969-1 | Security update for singularity | 2018-07-16T09:52:20Z | 2018-07-16T09:52:20Z |
| opensuse-su-2018:2327-1 | Security update for python-Django | 2018-08-14T14:57:13Z | 2018-08-14T14:57:13Z |
| opensuse-su-2018:2807-1 | Security update for seamonkey | 2018-08-16T07:40:05Z | 2018-08-16T07:40:05Z |
| opensuse-su-2018:2806-1 | Security update for nemo-extensions | 2018-08-16T18:39:40Z | 2018-08-16T18:39:40Z |
| opensuse-su-2018:2810-1 | Security update for aubio | 2018-08-16T18:40:42Z | 2018-08-16T18:40:42Z |
| opensuse-su-2018:2809-1 | Security update for python-Django1 | 2018-08-16T18:44:03Z | 2018-08-16T18:44:03Z |
| opensuse-su-2018:3687-1 | Security update for MozillaThunderbird | 2018-11-09T08:34:29Z | 2018-11-09T08:34:29Z |
| opensuse-su-2018:3835-1 | Security update for chromium | 2018-11-20T18:13:21Z | 2018-11-20T18:13:21Z |
| opensuse-su-2018:3839-1 | Security update for GraphicsMagick | 2018-11-21T19:12:13Z | 2018-11-21T19:12:13Z |
| opensuse-su-2018:3906-1 | Security update for SDL2_image | 2018-11-24T17:19:59Z | 2018-11-24T17:19:59Z |
| opensuse-su-2018:4045-1 | Security update for dom4j | 2018-12-07T18:04:50Z | 2018-12-07T18:04:50Z |
| opensuse-su-2018:4062-1 | Security update for pdns-recursor | 2018-12-10T13:09:45Z | 2018-12-10T13:09:45Z |
| opensuse-su-2018:4073-1 | Security update for pdns | 2018-12-11T14:12:15Z | 2018-12-11T14:12:15Z |
| opensuse-su-2018:4143-1 | Security update for Chromium | 2018-12-15T09:27:33Z | 2018-12-15T09:27:33Z |
| opensuse-su-2018:4177-1 | Security update for pdns-recursor | 2018-12-18T12:04:40Z | 2018-12-18T12:04:40Z |
| opensuse-su-2018:4175-1 | Security update for pdns | 2018-12-18T12:04:47Z | 2018-12-18T12:04:47Z |
| opensuse-su-2018:4302-1 | Security update for go | 2018-12-29T10:20:00Z | 2018-12-29T10:20:00Z |
| opensuse-su-2019:0003-1 | Security update for GraphicsMagick | 2019-01-01T16:33:52Z | 2019-01-01T16:33:52Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2015-00088 | Linux Kernel 'keys/gc.c'本地内存破坏漏洞 | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00089 | Apache Traffic Server 'HttpTransact.cc'拒绝服务漏洞 | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00090 | EMC Documentum Web Development Kit (WDK)存在未明漏洞 | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00091 | EMC Documentum Web Development Kit (WDK)存在未明框架注入漏洞 | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00092 | EMC Documentum Web Development Kit (WDK)存在多个跨站脚本漏洞 | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00093 | EMC Documentum Web Development Kit (WDK)URL重定向漏洞 | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00094 | EMC Documentum Web Development Kit (WDK)跨站请求伪造漏洞 | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00095 | AdaptCMS任意文件上传漏洞 | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00096 | AdaptCMS 'Referer' Header Field HTTP开放重定向漏洞 | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00097 | AdaptCMS存在多个HTML注入漏洞 | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00098 | HumHub SQL注入漏洞 | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00099 | Apache POI拒绝服务漏洞 | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00100 | Apache Solr跨站脚本漏洞 | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00101 | McAfee ePolicy Orchestrator 'conditionXML'参数XML外部实体注入漏洞 | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00102 | Xen拒绝服务漏洞(CNVD-2015-00102) | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00103 | FlexPaper 'FlexPaperViewer.swf'跨站脚本漏洞 | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00104 | FlexPaper ‘FlexPaperViewer.swf'’内容欺骗漏洞 | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00105 | Sefrengo CMS 'main.php'存在多个SQL注入漏洞 | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00106 | Sefrengo CMS 'main.php'跨站脚本漏洞 | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00144 | e107 ' e107_admin/users.php'跨站请求伪造漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00145 | Hex-Rays IDA Pro缓冲区溢出漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00146 | Ruby RedCloth library跨站脚本漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00147 | Easy File Sharing Web Server跨站脚本漏洞(CNVD-2015-00147) | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00148 | Microsoft Dynamics CRM跨站脚本漏洞 | 2015-01-07 | 2015-01-09 |
| cnvd-2015-00150 | gcab 'gcab-folder.c'本地目录遍历漏洞 | 2015-01-06 | 2015-01-09 |
| cnvd-2015-00151 | SAP NetWeaver Business Client存在多个跨站脚本漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00152 | ZOHO ManageEngine ADSelfService Plus跨站脚本漏洞(CNVD-2015-00152) | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00153 | CGManager本地信息泄露漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00154 | Strongswan IKEv2 Payloads远程拒绝服务漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00155 | D-Bus本地权限提升漏洞 | 2015-01-08 | 2015-01-09 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2000-avi-091 | Vulnérabilité de « Fast Mode » sous Firewall-1 | 2000-12-20T00:00:00.000000 | 2000-12-20T00:00:00.000000 |
| certa-2000-avi-092 | Vulnérabilités de Solaris | 2000-12-20T00:00:00.000000 | 2000-12-20T00:00:00.000000 |
| CERTA-2000-AVI-093 | Vulnérabilité sous Microsoft IIS (Extensions FrontPage) | 2000-12-28T00:00:00.000000 | 2000-12-28T00:00:00.000000 |
| certa-2000-avi-093 | Vulnérabilité sous Microsoft IIS (Extensions FrontPage) | 2000-12-28T00:00:00.000000 | 2000-12-28T00:00:00.000000 |
| CERTA-2001-AVI-001 | Vulnérabilité de Lotus Domino 5 | 2001-01-12T00:00:00.000000 | 2001-01-12T00:00:00.000000 |
| CERTA-2001-AVI-002 | Vulnérabilité de l'authentification NTLM sous Windows | 2001-01-12T00:00:00.000000 | 2001-01-12T00:00:00.000000 |
| CERTA-2001-AVI-003 | Accès privilégié oublié dans le code de Interbase Server de Borland | 2001-01-12T00:00:00.000000 | 2001-01-12T00:00:00.000000 |
| certa-2001-avi-001 | Vulnérabilité de Lotus Domino 5 | 2001-01-12T00:00:00.000000 | 2001-01-12T00:00:00.000000 |
| certa-2001-avi-002 | Vulnérabilité de l'authentification NTLM sous Windows | 2001-01-12T00:00:00.000000 | 2001-01-12T00:00:00.000000 |
| certa-2001-avi-003 | Accès privilégié oublié dans le code de Interbase Server de Borland | 2001-01-12T00:00:00.000000 | 2001-01-12T00:00:00.000000 |
| CERTA-2001-AVI-004 | Vulnérabilité dans ARP sous SunOS | 2001-01-15T00:00:00.000000 | 2001-01-15T00:00:00.000000 |
| certa-2001-avi-004 | Vulnérabilité dans ARP sous SunOS | 2001-01-15T00:00:00.000000 | 2001-01-15T00:00:00.000000 |
| CERTA-2001-AVI-005 | Vulnérabilité du système d'internationalisation sous SGI Irix. | 2001-01-19T00:00:00.000000 | 2001-01-19T00:00:00.000000 |
| certa-2001-avi-005 | Vulnérabilité du système d'internationalisation sous SGI Irix. | 2001-01-19T00:00:00.000000 | 2001-01-19T00:00:00.000000 |
| CERTA-2001-AVI-006 | Vulnérabilité sous Microsoft Power Point 2000 | 2001-01-24T00:00:00.000000 | 2001-01-24T00:00:00.000000 |
| CERTA-2001-AVI-007 | Mise à jour de Wu-FTPd | 2001-01-24T00:00:00.000000 | 2001-01-24T00:00:00.000000 |
| certa-2001-avi-006 | Vulnérabilité sous Microsoft Power Point 2000 | 2001-01-24T00:00:00.000000 | 2001-01-24T00:00:00.000000 |
| certa-2001-avi-007 | Mise à jour de Wu-FTPd | 2001-01-24T00:00:00.000000 | 2001-01-24T00:00:00.000000 |
| CERTA-2001-AVI-008 | Vulnérabilité sous Lotus Notes (Domino 5) | 2001-01-25T00:00:00.000000 | 2001-01-25T00:00:00.000000 |
| certa-2001-avi-008 | Vulnérabilité sous Lotus Notes (Domino 5) | 2001-01-25T00:00:00.000000 | 2001-01-25T00:00:00.000000 |
| CERTA-2001-AVI-009 | Vulnérabilité dans les permissions d'accès sous Windows NT 4 | 2001-01-30T00:00:00.000000 | 2001-01-30T00:00:00.000000 |
| certa-2001-avi-009 | Vulnérabilité dans les permissions d'accès sous Windows NT 4 | 2001-01-30T00:00:00.000000 | 2001-01-30T00:00:00.000000 |
| CERTA-2001-AVI-011 | Vulnérabilités de MySQL 3.23.31 et du module PHP d'apache sous Linux | 2001-01-31T00:00:00.000000 | 2001-01-31T00:00:00.000000 |
| certa-2001-avi-011 | Vulnérabilités de MySQL 3.23.31 et du module PHP d'apache sous Linux | 2001-01-31T00:00:00.000000 | 2001-01-31T00:00:00.000000 |
| CERTA-2001-AVI-012 | Vulnérabilité dans le protocole RDP sous Windows 2000 | 2001-02-01T00:00:00.000000 | 2001-02-01T00:00:00.000000 |
| certa-2001-avi-012 | Vulnérabilité dans le protocole RDP sous Windows 2000 | 2001-02-01T00:00:00.000000 | 2001-02-01T00:00:00.000000 |
| CERTA-2001-AVI-013 | Vulnérabilités sur les commutateurs CISCO série CSS | 2001-02-05T00:00:00.000000 | 2001-02-05T00:00:00.000000 |
| certa-2001-avi-013 | Vulnérabilités sur les commutateurs CISCO série CSS | 2001-02-05T00:00:00.000000 | 2001-02-05T00:00:00.000000 |
| CERTA-2001-AVI-014 | Vulnérabilité de l'agent NDDE de Microsoft Windows | 2001-02-07T00:00:00.000000 | 2001-02-07T00:00:00.000000 |
| certa-2001-avi-014 | Vulnérabilité de l'agent NDDE de Microsoft Windows | 2001-02-07T00:00:00.000000 | 2001-02-07T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTA-2006-ALE-014 | Vulnérabilités dans Microsoft Word | 2006-12-06T00:00:00.000000 | 2007-02-14T00:00:00.000000 |
| certa-2006-ale-014 | Vulnérabilités dans Microsoft Word | 2006-12-06T00:00:00.000000 | 2007-02-14T00:00:00.000000 |
| CERTA-2006-ALE-013 | Vulnérabilité de MacOS X | 2006-11-23T00:00:00.000000 | 2007-02-16T00:00:00.000000 |
| certa-2006-ale-013 | Vulnérabilité de MacOS X | 2006-11-23T00:00:00.000000 | 2007-02-16T00:00:00.000000 |
| CERTA-2007-ALE-002 | Vulnérabilité dans Windows | 2007-01-12T00:00:00.000000 | 2007-04-03T00:00:00.000000 |
| CERTA-2007-ALE-008 | Vulnérabilité dans Mirosoft Windows | 2007-03-29T00:00:00.000000 | 2007-04-03T00:00:00.000000 |
| certa-2007-ale-002 | Vulnérabilité dans Windows | 2007-01-12T00:00:00.000000 | 2007-04-03T00:00:00.000000 |
| certa-2007-ale-008 | Vulnérabilité dans Mirosoft Windows | 2007-03-29T00:00:00.000000 | 2007-04-03T00:00:00.000000 |
| CERTA-2007-ALE-009 | Vulnérabilité dans BrightStor ARCServe Backup | 2007-03-30T00:00:00.000000 | 2007-04-27T00:00:00.000000 |
| certa-2007-ale-009 | Vulnérabilité dans BrightStor ARCServe Backup | 2007-03-30T00:00:00.000000 | 2007-04-27T00:00:00.000000 |
| CERTA-2007-ALE-006 | Vulnérabilité dans le logiciel Microsoft Word | 2007-02-16T00:00:00.000000 | 2007-05-09T00:00:00.000000 |
| CERTA-2007-ALE-010 | Vulnérabilité de Microsoft DNS Server | 2007-04-16T00:00:00.000000 | 2007-05-09T00:00:00.000000 |
| certa-2007-ale-006 | Vulnérabilité dans le logiciel Microsoft Word | 2007-02-16T00:00:00.000000 | 2007-05-09T00:00:00.000000 |
| certa-2007-ale-010 | Vulnérabilité de Microsoft DNS Server | 2007-04-16T00:00:00.000000 | 2007-05-09T00:00:00.000000 |
| CERTA-2007-ALE-012 | Multiples vulnérabilités dans Mozilla Firefox | 2007-06-06T00:00:00.000000 | 2007-07-18T00:00:00.000000 |
| certa-2007-ale-012 | Multiples vulnérabilités dans Mozilla Firefox | 2007-06-06T00:00:00.000000 | 2007-07-18T00:00:00.000000 |
| CERTA-2007-ALE-013 | Vulnérabilité dans Mozilla Firefox | 2007-07-27T00:00:00.000000 | 2007-07-31T00:00:00.000000 |
| certa-2007-ale-013 | Vulnérabilité dans Mozilla Firefox | 2007-07-27T00:00:00.000000 | 2007-07-31T00:00:00.000000 |
| CERTA-2007-ALE-014 | Vulnérabilité dans Apple QuickTime | 2007-09-13T00:00:00.000000 | 2007-10-12T00:00:00.000000 |
| certa-2007-ale-014 | Vulnérabilité dans Apple QuickTime | 2007-09-13T00:00:00.000000 | 2007-10-12T00:00:00.000000 |
| CERTA-2007-ALE-015 | Vulnérabilité dans le traitement des URI sous Windows | 2007-10-10T00:00:00.000000 | 2007-11-14T00:00:00.000000 |
| certa-2007-ale-015 | Vulnérabilité dans le traitement des URI sous Windows | 2007-10-10T00:00:00.000000 | 2007-11-14T00:00:00.000000 |
| CERTA-2007-ALE-016 | Vulnérabilité d'Oracle 10g | 2007-11-16T00:00:00.000000 | 2007-11-16T00:00:00.000000 |
| certa-2007-ale-016 | Vulnérabilité d'Oracle 10g | 2007-11-16T00:00:00.000000 | 2007-11-16T00:00:00.000000 |
| CERTA-2007-ALE-017 | Vulnérabilité dans la gestion RTSP d'Apple QuickTime | 2007-11-27T00:00:00.000000 | 2007-12-14T00:00:00.000000 |
| certa-2007-ale-017 | Vulnérabilité dans la gestion RTSP d'Apple QuickTime | 2007-11-27T00:00:00.000000 | 2007-12-14T00:00:00.000000 |
| CERTA-2008-ALE-001 | Vulnérabilité dans Apple QuickTime | 2008-01-11T00:00:00.000000 | 2008-02-07T00:00:00.000000 |
| certa-2008-ale-001 | Vulnérabilité dans Apple QuickTime | 2008-01-11T00:00:00.000000 | 2008-02-07T00:00:00.000000 |
| CERTA-2008-ALE-002 | Vulnérabilité dans Joomla! | 2008-01-14T00:00:00.000000 | 2008-02-25T00:00:00.000000 |
| certa-2008-ale-002 | Vulnérabilité dans Joomla! | 2008-01-14T00:00:00.000000 | 2008-02-25T00:00:00.000000 |