Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2002-0088 |
N/A
|
Buffer overflow in admintool in Solaris 2.6, 7, a… |
n/a |
n/a |
2002-03-07T05:00:00.000Z | 2024-08-08T02:35:17.415Z |
| CVE-2002-0089 |
N/A
|
Buffer overflow in admintool in Solaris 2.5 throu… |
n/a |
n/a |
2002-03-07T05:00:00.000Z | 2024-08-08T02:35:17.569Z |
| CVE-2002-0091 |
N/A
|
Multiple CGI scripts in CIDER SHADOW 1.5 and 1.6 … |
n/a |
n/a |
2002-03-07T05:00:00.000Z | 2024-08-08T02:35:17.580Z |
| CVE-1999-0380 |
N/A
|
SLMail 3.1 and 3.2 allows local users to access a… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T16:34:52.031Z |
| CVE-1999-0801 |
N/A
|
BMC Patrol allows remote attackers to gain access… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T16:48:38.097Z |
| CVE-1999-0815 |
N/A
|
Memory leak in SNMP agent in Windows NT 4.0 befor… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T16:48:38.123Z |
| CVE-1999-0921 |
N/A
|
BMC Patrol allows any remote attacker to flood it… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T16:55:29.280Z |
| CVE-1999-0930 |
N/A
|
wwwboard allows a remote attacker to delete messa… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T16:55:29.407Z |
| CVE-1999-0968 |
N/A
|
Buffer overflow in BNC IRC proxy allows remote at… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T16:55:29.271Z |
| CVE-1999-1014 |
N/A
|
Buffer overflow in mail command in Solaris 2.7 an… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T16:55:29.467Z |
| CVE-1999-1019 |
N/A
|
SpectroSERVER in Cabletron Spectrum Enterprise Ma… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T16:55:29.460Z |
| CVE-1999-1021 |
N/A
|
NFS on SunOS 4.1 through 4.1.2 ignores the high o… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T16:55:29.374Z |
| CVE-1999-1027 |
N/A
|
Solaris 2.6 HW3/98 installs admintool with world-… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T16:55:29.498Z |
| CVE-1999-1028 |
N/A
|
Symantec pcAnywhere 8.0 allows remote attackers t… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T16:55:29.483Z |
| CVE-1999-1032 |
N/A
|
Vulnerability in LAT/Telnet Gateway (lattelnet) o… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T16:55:29.565Z |
| CVE-1999-1034 |
N/A
|
Vulnerability in login in AT&T System V Release 4… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T16:55:29.570Z |
| CVE-1999-1035 |
N/A
|
IIS 3.0 and 4.0 on x86 and Alpha allows remote at… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T16:55:29.402Z |
| CVE-1999-1037 |
N/A
|
rex.satan in SATAN 1.1.1 allows local users to ov… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T16:55:29.380Z |
| CVE-1999-1044 |
N/A
|
Vulnerability in Advanced File System Utility (ad… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T16:55:29.479Z |
| CVE-1999-1045 |
N/A
|
pnserver in RealServer 5.0 and earlier allows rem… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T16:55:29.376Z |
| CVE-1999-1047 |
N/A
|
When BSDI patches for Gauntlet 5.0 BSDI are insta… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T16:55:29.418Z |
| CVE-1999-1048 |
N/A
|
Buffer overflow in bash 2.0.0, 1.4.17, and other … |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T16:55:29.537Z |
| CVE-1999-1055 |
N/A
|
Microsoft Excel 97 does not warn the user before … |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T17:02:53.080Z |
| CVE-1999-1057 |
N/A
|
VMS 4.0 through 5.3 allows local users to gain pr… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T17:02:53.478Z |
| CVE-1999-1059 |
N/A
|
Vulnerability in rexec daemon (rexecd) in AT&T TC… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T17:02:52.980Z |
| CVE-1999-1074 |
N/A
|
Webmin before 0.5 does not restrict the number of… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T17:02:53.696Z |
| CVE-1999-1085 |
N/A
|
SSH 1.2.25, 1.2.23, and other versions, when used… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T17:02:53.700Z |
| CVE-1999-1087 |
N/A
|
Internet Explorer 4 treats a 32-bit number ("dotl… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T17:02:53.775Z |
| CVE-1999-1090 |
N/A
|
The default configuration of NCSA Telnet package … |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T17:02:53.571Z |
| CVE-1999-1093 |
N/A
|
Buffer overflow in the Window.External function i… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T17:02:53.660Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2001-0355 |
N/A
|
Novell Groupwise 5.5 (sp1 and sp2) allows a remot… |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:14:07.420Z |
| CVE-2001-0358 |
N/A
|
Buffer overflows in Sierra Half-Life build 1573 a… |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:14:07.434Z |
| CVE-2001-0359 |
N/A
|
Format string vulnerability in Sierra Half-Life b… |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:14:07.408Z |
| CVE-2001-0360 |
N/A
|
Directory traversal vulnerability in help.cgi in … |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:14:07.436Z |
| CVE-2001-0361 |
N/A
|
Implementations of SSH version 1.5, including (1)… |
n/a |
n/a |
2001-09-18T04:00:00.000Z | 2024-08-08T04:14:07.435Z |
| CVE-2001-0364 |
N/A
|
SSH Communications Security sshd 2.4 for Windows … |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:14:07.439Z |
| CVE-2001-0365 |
N/A
|
Eudora before 5.1 allows a remote attacker to exe… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:14:07.481Z |
| CVE-2001-0366 |
N/A
|
saposcol in SAP R/3 Web Application Server Demo b… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:14:07.438Z |
| CVE-2001-0367 |
N/A
|
Mirabilis ICQ WebFront Plug-in ICQ2000b Build 327… |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:14:07.426Z |
| CVE-2001-0368 |
N/A
|
Directory traversal vulnerability in BearShare 2.… |
n/a |
n/a |
2001-09-18T04:00:00.000Z | 2024-08-08T04:14:07.422Z |
| CVE-2001-0369 |
N/A
|
Buffer overflow in lpsched on DGUX version R4.20M… |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:14:07.425Z |
| CVE-2001-0370 |
N/A
|
fcheck prior to 2.57.59 calls the file signature … |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:14:07.423Z |
| CVE-2001-0378 |
N/A
|
readline prior to 4.1, in OpenBSD 2.8 and earlier… |
n/a |
n/a |
2001-09-18T04:00:00.000Z | 2024-08-08T04:21:37.071Z |
| CVE-2001-0381 |
N/A
|
The OpenPGP PGP standard allows an attacker to de… |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:21:37.228Z |
| CVE-2001-0388 |
N/A
|
time server daemon timed allows remote attackers … |
n/a |
n/a |
2001-09-18T04:00:00.000Z | 2024-08-08T04:21:37.222Z |
| CVE-2001-0407 |
N/A
|
Directory traversal vulnerability in MySQL before… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:21:37.930Z |
| CVE-2001-0415 |
N/A
|
REDIPlus program, REDI.exe, stores passwords and … |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:21:37.270Z |
| CVE-2001-0416 |
N/A
|
sgml-tools (aka sgmltools) before 1.0.9-15 create… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:21:37.799Z |
| CVE-2001-0417 |
N/A
|
Kerberos 4 (aka krb4) allows local users to overw… |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:21:37.901Z |
| CVE-2001-0425 |
N/A
|
AdLibrary.pm in AdCycle 0.78b allows remote attac… |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:21:38.228Z |
| CVE-2001-0441 |
N/A
|
Buffer overflow in (1) wrapping and (2) unwrappin… |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:21:38.397Z |
| CVE-2001-0442 |
N/A
|
Buffer overflow in Mercury MTA POP3 server for Ne… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:21:38.448Z |
| CVE-2001-0449 |
N/A
|
Buffer overflow in WinZip 8.0 allows attackers to… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:21:37.807Z |
| CVE-2001-0450 |
N/A
|
Directory traversal vulnerability in Transsoft FT… |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:21:38.410Z |
| CVE-2001-0451 |
N/A
|
INDEXU 2.0 beta and earlier allows remote attacke… |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:21:38.675Z |
| CVE-2001-0452 |
N/A
|
BRS WebWeaver FTP server before 0.64 Beta allows … |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:21:38.578Z |
| CVE-2001-0453 |
N/A
|
Directory traversal vulnerability in BRS WebWeave… |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:21:38.566Z |
| CVE-2001-0454 |
N/A
|
Directory traversal vulnerability in SlimServe HT… |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:21:38.540Z |
| CVE-2001-0455 |
N/A
|
Cisco Aironet 340 Series wireless bridge before 8… |
n/a |
n/a |
2001-09-18T04:00:00.000Z | 2024-08-08T04:21:38.543Z |
| CVE-2001-0456 |
N/A
|
postinst installation script for Proftpd in Debia… |
n/a |
n/a |
2001-09-18T04:00:00.000Z | 2024-08-08T04:21:38.530Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-q88g-qx42-xfrh |
|
Path traversal in bolt/core | 2021-02-18T20:51:56Z | 2021-02-24T06:53:21Z |
| ghsa-q2hm-gx3f-h63q |
|
Backdoor / Malicious code | 2021-02-23T21:23:16Z | 2021-02-23T21:23:16Z |
| ghsa-26hg-crh6-mjrw |
|
Directory Traversal | 2021-02-23T21:28:28Z | 2021-02-23T21:28:28Z |
| ghsa-5hx7-77g4-wqx3 |
|
Incorrect Authorization | 2021-02-23T21:30:56Z | 2021-02-23T21:30:56Z |
| ghsa-f6gj-7592-5jxm |
|
Directory Traversal | 2021-02-23T21:33:53Z | 2021-02-23T21:33:53Z |
| ghsa-9vhv-p9r7-rm53 |
|
HTML tag injection | 2021-02-23T21:37:48Z | 2021-02-23T21:37:48Z |
| ghsa-wj5j-xpcj-45gc |
|
Cross-Site Request Forgery (CSRF) | 2021-02-24T19:17:37Z | 2021-02-24T19:17:37Z |
| ghsa-q594-2475-8v9f |
|
Unencrypted passwords | 2021-02-24T19:33:17Z | 2021-02-24T19:33:17Z |
| ghsa-h6wq-jw7q-grxv |
|
Elliptic Curve Key Disclosure | 2021-02-24T19:38:21Z | 2021-02-24T19:38:21Z |
| ghsa-c8m9-mh38-97p9 |
|
XML external entity (XXE) vulnerability | 2021-02-24T19:40:41Z | 2021-02-24T19:40:41Z |
| ghsa-xm8r-5wh6-f46f |
|
Timing attack | 2021-02-24T19:45:15Z | 2021-02-24T19:45:15Z |
| ghsa-57h7-r3q3-w57j |
|
Cross-Site Scripting | 2021-02-24T19:46:00Z | 2021-02-24T19:46:00Z |
| ghsa-94ww-22rx-493x |
|
Cross-Site Scripting | 2021-02-24T19:46:35Z | 2021-02-24T19:46:35Z |
| ghsa-jcgq-xh2f-2hfm |
|
Regular Expression Denial of Service | 2021-02-25T01:20:42Z | 2021-02-25T01:20:42Z |
| ghsa-qfmr-6qvh-49gm |
|
XSS | 2021-02-25T01:44:38Z | 2021-02-25T01:44:38Z |
| ghsa-8wp3-cp9v-44fm |
|
Cross-Site Scripting in marked | 2021-02-25T02:01:15Z | 2021-02-25T02:01:15Z |
| ghsa-7m7q-q53v-j47v |
|
Regular Expression Denial of Service | 2021-02-25T02:01:47Z | 2021-02-25T02:01:47Z |
| ghsa-wjmf-58vc-xqjr |
|
Content injection in marked | 2021-02-25T02:01:56Z | 2021-02-25T02:01:56Z |
| ghsa-pr5m-4w22-8483 |
|
NanoHTTPD Cross-site Scripting vulnerability | 2021-02-25T16:32:34Z | 2023-09-12T16:37:20Z |
| ghsa-h7f9-cvh5-qw7f |
7.1 (3.1)
|
Path traversal in pimcore/pimcore | 2021-02-25T16:32:46Z | 2023-09-12T15:34:23Z |
| ghsa-j95h-wmx9-4279 |
|
Denial of Service | 2021-02-25T17:15:39Z | 2021-02-25T17:15:39Z |
| ghsa-v6wp-4m6f-gcjg |
3.1 (3.1)
2.3 (4.0)
|
`aiohttp` Open Redirect vulnerability (`normalize_path_middleware` middleware) | 2021-02-26T02:11:57Z | 2024-09-03T21:02:49Z |
| ghsa-xp9c-82x8-7f67 |
7.7 (3.1)
|
Prototype Pollution in Node-Red | 2021-02-26T16:31:05Z | 2021-09-22T13:55:00Z |
| ghsa-m33v-338h-4v9f |
|
Path traversal in Node-Red | 2021-02-26T16:31:23Z | 2021-02-26T16:23:34Z |
| ghsa-v936-j8gp-9q3p |
3.1 (3.1)
6.3 (4.0)
|
Open redirects on some federation and push requests | 2021-02-26T17:28:34Z | 2024-09-24T15:35:29Z |
| ghsa-3rpf-5rqv-689q |
9.8 (3.1)
|
PHP Code Injection by malicious function name in smarty | 2021-02-26T19:53:24Z | 2022-05-03T03:01:58Z |
| ghsa-2hwx-mjrm-v3g8 |
4.3 (3.1)
5.3 (4.0)
|
Denial of service attack via .well-known lookups | 2021-03-01T19:34:54Z | 2024-09-30T20:23:54Z |
| ghsa-xr9h-9m79-x29g |
|
SSRF in Rendertron | 2021-03-01T19:38:23Z | 2021-02-24T06:59:10Z |
| ghsa-2mm9-c2fx-c7m4 |
6.1 (3.1)
|
Docsify XSS Vulnerability | 2021-03-01T19:44:27Z | 2023-09-13T20:21:27Z |
| ghsa-h4hr-7fg3-h35w |
|
Denial of service in prismjs | 2021-03-01T19:52:33Z | 2023-09-05T22:59:24Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2022-1811 | Malicious code in calc_zhbuzptw45 (npm) | 2022-06-20T20:19:55Z | 2022-06-20T20:19:55Z |
| mal-2022-1505 | Malicious code in berakss (npm) | 2022-06-20T20:19:56Z | 2022-06-20T20:19:56Z |
| mal-2022-1772 | Malicious code in calc_a1zajwr9k7 (npm) | 2022-06-20T20:19:56Z | 2022-06-20T20:19:56Z |
| mal-2022-1777 | Malicious code in calc_cqbu4yluwj (npm) | 2022-06-20T20:19:56Z | 2022-06-20T20:19:57Z |
| mal-2022-1803 | Malicious code in calc_uu563lcq5d (npm) | 2022-06-20T20:19:56Z | 2022-06-20T20:19:57Z |
| mal-2022-5086 | Malicious code in op121 (npm) | 2022-06-20T20:19:56Z | 2022-06-20T20:19:57Z |
| mal-2022-5343 | Malicious code in pipelines-javascript (npm) | 2022-06-20T20:19:57Z | 2022-06-20T20:19:58Z |
| mal-2022-5592 | Malicious code in ravi-test (npm) | 2022-06-20T20:19:57Z | 2022-06-20T20:19:58Z |
| mal-2022-6478 | Malicious code in test-free (npm) | 2022-06-20T20:19:57Z | 2022-06-20T20:19:57Z |
| mal-2022-4173 | Malicious code in kiota-authentication-azure (npm) | 2022-06-20T20:19:58Z | 2022-06-20T20:19:58Z |
| mal-2022-4174 | Malicious code in kiota-serialization-json (npm) | 2022-06-20T20:19:58Z | 2022-06-20T20:19:59Z |
| mal-2022-5085 | Malicious code in oopp (npm) | 2022-06-20T20:19:58Z | 2022-06-20T20:19:58Z |
| mal-2022-5984 | Malicious code in se.hecate.visual-studio (npm) | 2022-06-20T20:19:58Z | 2022-06-20T20:19:58Z |
| mal-2022-1788 | Malicious code in calc_nll0q4swog (npm) | 2022-06-20T20:19:59Z | 2022-06-20T20:20:00Z |
| mal-2022-3921 | Malicious code in invision-nodejs-test-utils (npm) | 2022-06-20T20:19:59Z | 2022-06-20T20:19:59Z |
| mal-2022-4525 | Malicious code in mdcs-pns (npm) | 2022-06-20T20:19:59Z | 2022-06-20T20:19:59Z |
| mal-2022-6430 | Malicious code in tdd-react-store-locator (npm) | 2022-06-20T20:19:59Z | 2022-06-20T20:20:00Z |
| mal-2022-6678 | Malicious code in tuhin1729 (npm) | 2022-06-20T20:19:59Z | 2022-06-20T20:20:03Z |
| mal-2022-1776 | Malicious code in calc_bx9d74rupg (npm) | 2022-06-20T20:20:00Z | 2022-06-20T20:20:01Z |
| mal-2022-1779 | Malicious code in calc_ey6ts1s5ll (npm) | 2022-06-20T20:20:00Z | 2022-06-20T20:20:00Z |
| mal-2022-1812 | Malicious code in calculator_artificialinteligence (npm) | 2022-06-20T20:20:00Z | 2022-06-20T20:20:00Z |
| mal-2022-7279 | Malicious code in xienimnew (npm) | 2022-06-20T20:20:00Z | 2022-06-20T20:20:01Z |
| mal-2022-1768 | Malicious code in calc_8t54md4jfe (npm) | 2022-06-20T20:20:01Z | 2022-06-20T20:20:02Z |
| mal-2022-3978 | Malicious code in it-advisor-webclient (npm) | 2022-06-20T20:20:01Z | 2022-06-20T20:20:01Z |
| mal-2022-4587 | Malicious code in microsoft-intern (npm) | 2022-06-20T20:20:01Z | 2022-06-20T20:20:01Z |
| mal-2022-4929 | Malicious code in now-dashboard-analyze (npm) | 2022-06-20T20:20:01Z | 2022-06-20T20:20:02Z |
| mal-2022-1765 | Malicious code in calc_545f8kcu2j (npm) | 2022-06-20T20:20:02Z | 2022-06-20T20:20:02Z |
| mal-2022-1767 | Malicious code in calc_8kp8btogfy (npm) | 2022-06-20T20:20:02Z | 2022-06-20T20:20:02Z |
| mal-2022-1793 | Malicious code in calc_qq9esg40er (npm) | 2022-06-20T20:20:02Z | 2022-06-20T20:20:03Z |
| mal-2022-1775 | Malicious code in calc_bc8zluyekj (npm) | 2022-06-20T20:20:03Z | 2022-06-20T20:20:03Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2023-1407 | QT: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2023-06-08T22:00:00.000+00:00 | 2023-06-08T22:00:00.000+00:00 |
| wid-sec-w-2023-1408 | Hashicorp Vault: Schwachstelle ermöglicht Cross-Site Scripting | 2023-06-11T22:00:00.000+00:00 | 2023-06-11T22:00:00.000+00:00 |
| wid-sec-w-2023-1409 | ImageMagick: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2023-06-11T22:00:00.000+00:00 | 2024-08-05T22:00:00.000+00:00 |
| wid-sec-w-2023-1410 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2023-06-11T22:00:00.000+00:00 | 2024-02-27T23:00:00.000+00:00 |
| wid-sec-w-2023-1411 | Fortinet FortiOS und FortiProxy: Schwachstelle ermöglicht Codeausführung | 2023-06-11T22:00:00.000+00:00 | 2023-06-13T22:00:00.000+00:00 |
| wid-sec-w-2023-1412 | Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation und Denial of Service | 2023-06-11T22:00:00.000+00:00 | 2023-06-11T22:00:00.000+00:00 |
| wid-sec-w-2023-1413 | Progress Software MOVEit: Schwachstelle ermöglicht SQL Injection | 2023-06-11T22:00:00.000+00:00 | 2023-06-11T22:00:00.000+00:00 |
| wid-sec-w-2023-1414 | Mozilla Thunderbird: Mehrere Schwachstellen | 2023-06-11T22:00:00.000+00:00 | 2024-02-27T23:00:00.000+00:00 |
| wid-sec-w-2023-1415 | D-LINK DI-7500G-CI: Schwachstelle ermöglicht Cross-Site Scripting | 2023-06-11T22:00:00.000+00:00 | 2023-06-11T22:00:00.000+00:00 |
| wid-sec-w-2023-1416 | Bitwarden: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2023-06-11T22:00:00.000+00:00 | 2023-06-12T22:00:00.000+00:00 |
| wid-sec-w-2023-1417 | ImageMagick: Mehrere Schwachstellen ermöglichen Denial of Service | 2023-06-11T22:00:00.000+00:00 | 2023-08-22T22:00:00.000+00:00 |
| wid-sec-w-2023-1419 | Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2023-06-12T22:00:00.000+00:00 | 2023-06-12T22:00:00.000+00:00 |
| wid-sec-w-2023-1420 | Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2023-06-12T22:00:00.000+00:00 | 2023-06-12T22:00:00.000+00:00 |
| wid-sec-w-2023-1421 | Siemens JT2Go: Mehrere Schwachstellen | 2023-06-12T22:00:00.000+00:00 | 2023-06-12T22:00:00.000+00:00 |
| wid-sec-w-2023-1423 | Apache Nifi: Mehrere Schwachstellen | 2023-06-12T22:00:00.000+00:00 | 2023-06-12T22:00:00.000+00:00 |
| wid-sec-w-2023-1424 | Xerox FreeFlow Print Server für Solaris: Mehrere Schwachstellen | 2023-06-12T22:00:00.000+00:00 | 2025-10-06T22:00:00.000+00:00 |
| wid-sec-w-2023-1426 | Synology Router Manager: Mehrere Schwachstellen | 2023-06-12T22:00:00.000+00:00 | 2023-06-18T22:00:00.000+00:00 |
| wid-sec-w-2023-1427 | Siemens SIMATIC WinCC: Mehrere Schwachstellen | 2023-06-12T22:00:00.000+00:00 | 2023-06-12T22:00:00.000+00:00 |
| wid-sec-w-2023-1428 | Zoom Video Communications Zoom Client und Zoom On-Premise: Mehrere Schwachstellen | 2023-06-12T22:00:00.000+00:00 | 2023-06-12T22:00:00.000+00:00 |
| wid-sec-w-2023-1429 | Siemens TIA Portal: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-06-12T22:00:00.000+00:00 | 2023-06-12T22:00:00.000+00:00 |
| wid-sec-w-2023-1430 | Siemens SICAM: Mehrere Schwachstellen | 2023-06-12T22:00:00.000+00:00 | 2023-06-12T22:00:00.000+00:00 |
| wid-sec-w-2023-1431 | Siemens SICAM: Mehrere Schwachstellen | 2023-06-12T22:00:00.000+00:00 | 2025-12-08T23:00:00.000+00:00 |
| wid-sec-w-2023-1432 | Siemens SIMATIC S7: Mehrere Schwachstellen | 2023-06-12T22:00:00.000+00:00 | 2023-06-22T22:00:00.000+00:00 |
| wid-sec-w-2023-1433 | Siemens SIMATIC S7: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten | 2023-06-12T22:00:00.000+00:00 | 2023-06-12T22:00:00.000+00:00 |
| wid-sec-w-2023-1435 | Hitachi Energy Relion: Mehrere Schwachstellen | 2023-06-12T22:00:00.000+00:00 | 2023-06-12T22:00:00.000+00:00 |
| wid-sec-w-2023-1436 | Shibboleth Service Provider: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2023-06-12T22:00:00.000+00:00 | 2023-06-12T22:00:00.000+00:00 |
| wid-sec-w-2023-1437 | SAP Patchday Juni 2023 | 2023-06-12T22:00:00.000+00:00 | 2023-06-12T22:00:00.000+00:00 |
| wid-sec-w-2023-1439 | Fortinet FortiAnalyzer: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-06-12T22:00:00.000+00:00 | 2023-06-12T22:00:00.000+00:00 |
| wid-sec-w-2023-1440 | Fortinet FortiClient: Schwachstelle ermöglicht Manipulation von Dateien | 2023-06-12T22:00:00.000+00:00 | 2023-06-12T22:00:00.000+00:00 |
| wid-sec-w-2023-1441 | Barracuda Networks Email Security Gateway: Schwachstelle ermöglicht Codeausführung | 2023-06-12T22:00:00.000+00:00 | 2023-07-05T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-135-07 | Siemens SIMATIC IPC RS-828A | 2025-05-13T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-135-08 | Siemens VersiCharge AC Series EV Chargers | 2025-05-13T00:00:00.000000Z | 2025-05-13T00:00:00.000000Z |
| icsa-25-135-09 | Siemens User Management Component (UMC) | 2025-05-13T00:00:00.000000Z | 2025-10-14T00:00:00.000000Z |
| icsa-25-135-10 | Siemens OZW Web Servers | 2025-05-13T00:00:00.000000Z | 2025-05-13T00:00:00.000000Z |
| icsa-25-135-11 | Siemens Polarion | 2025-05-13T00:00:00.000000Z | 2025-05-13T00:00:00.000000Z |
| icsa-25-135-12 | Siemens SIMATIC PCS | 2025-05-13T00:00:00.000000Z | 2025-05-13T00:00:00.000000Z |
| icsa-25-135-13 | Siemens SIRIUS | 2025-05-13T00:00:00.000000Z | 2025-05-13T00:00:00.000000Z |
| icsa-25-135-14 | Siemens APOGEE PXC and TALON TC Series | 2025-05-13T00:00:00.000000Z | 2025-05-13T00:00:00.000000Z |
| icsa-25-135-15 | Siemens Mendix OIDC SSO | 2025-05-13T00:00:00.000000Z | 2026-04-16T06:00:00.000000Z |
| icsa-25-135-16 | Siemens MS/TP Point Pickup Module | 2025-05-13T00:00:00.000000Z | 2025-05-13T00:00:00.000000Z |
| icsa-25-135-17 | Siemens RUGGEDCOM ROX II | 2025-05-13T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-25-135-18 | Siemens SCALANCE LPE9403 | 2025-05-13T00:00:00.000000Z | 2025-05-13T00:00:00.000000Z |
| icsa-25-148-02 | Siemens SiPass Integrated | 2025-05-13T00:00:00.000000Z | 2025-05-13T00:00:00.000000Z |
| icsa-25-140-06 | Schneider Electric PrismaSeT Active - Wireless Panel Server | 2025-05-13T04:00:00.000000Z | 2025-05-13T04:00:00.000000Z |
| icsa-25-140-07 | Schneider Electric Galaxy VS, Galaxy VL, Galaxy VXL (Update A) | 2025-05-13T04:00:00.000000Z | 2025-09-24T04:00:00.000000Z |
| icsa-25-140-08 | Schneider Electric Modicon Controllers (Update B) | 2025-05-13T04:00:00.000000Z | 2025-10-14T07:00:00.000000Z |
| icsa-25-153-02 | Schneider Electric EcoStruxure Power Build Rapsody | 2025-05-13T04:00:00.000000Z | 2025-05-13T04:00:00.000000Z |
| icsa-25-133-04 | ABB Automation Builder | 2025-05-13T06:00:00.000000Z | 2025-05-13T06:00:00.000000Z |
| icsa-25-140-05 | Siemens Siveillance Video | 2025-05-14T00:00:00.000000Z | 2025-05-14T00:00:00.000000Z |
| icsa-25-135-19 | ECOVACS DEEBOT Vacuum and Base Station (Update A) | 2025-05-15T06:00:00.000000Z | 2025-07-10T06:00:00.000000Z |
| icsa-25-135-20 | Schneider Electric EcoStruxure Power Build Rapsody | 2025-05-15T06:00:00.000000Z | 2025-05-15T06:00:00.000000Z |
| va-25-136-01 | IBM Security Guardium stored cross-site scripting | 2025-05-16T20:14:51Z | 2025-06-16T00:00:00Z |
| icsa-25-140-04 | Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electric Products (Update F) | 2025-05-20T04:00:00.000000Z | 2026-04-07T05:00:00.000000Z |
| icsa-25-140-01 | ABUP IoT Cloud Platform | 2025-05-20T06:00:00.000000Z | 2025-05-20T06:00:00.000000Z |
| icsa-25-140-02 | National Instruments Circuit Design Suite | 2025-05-20T06:00:00.000000Z | 2025-05-20T06:00:00.000000Z |
| icsa-25-140-03 | Danfoss AK-SM 8xxA Series (Update A) | 2025-05-20T06:00:00.000000Z | 2025-08-26T06:00:00.000000Z |
| icsa-25-140-09 | AutomationDirect MB-Gateway | 2025-05-20T06:00:00.000000Z | 2025-05-20T06:00:00.000000Z |
| icsa-25-140-10 | Vertiv Liebert RDU101 and UNITY | 2025-05-20T06:00:00.000000Z | 2025-05-20T06:00:00.000000Z |
| icsa-25-140-11 | Assured Telematics Inc (ATI) Fleet Management System (Update A) | 2025-05-20T06:00:00.000000Z | 2025-06-10T06:00:00.000000Z |
| icsa-25-142-01 | Lantronix Device Installer | 2025-05-22T06:00:00.000000Z | 2025-05-22T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2022-42915 | curl before 7.86.0 has a double free. If curl is told to use an HTTP proxy for a transfer with a non-HTTP(S) URL it sets up the connection to the remote server by issuing a CONNECT request to the proxy and then tunnels the rest of the protocol through. An HTTP proxy might refuse this request (HTTP proxies often only allow outgoing connections to specific port numbers like 443 for HTTPS) and instead return a non-200 status code to the client. Due to flaws in the error/cleanup handling this could trigger a double free in curl if one of the following schemes were used in the URL for the transfer: dict gopher gophers ldap ldaps rtmp rtmps or telnet. The earliest affected version is 7.77.0. | 2022-10-02T00:00:00.000Z | 2026-02-18T03:09:47.000Z |
| msrc_cve-2022-42916 | In curl before 7.86.0 the HSTS check could be bypassed to trick it into staying with HTTP. Using its HSTS support curl can be instructed to use HTTPS directly (instead of using an insecure cleartext HTTP step) even when HTTP is provided in the URL. This mechanism could be bypassed if the host name in the given URL uses IDN characters that get replaced with ASCII counterparts as part of the IDN conversion e.g. using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop of U+002E (.). The earliest affected version is 7.77.0 2021-05-26. | 2022-10-02T00:00:00.000Z | 2026-02-18T14:10:58.000Z |
| msrc_cve-2022-42969 | The py library through 1.11.0 for Python allows remote attackers to conduct a ReDoS (Regular expression Denial of Service) attack via a Subversion repository with crafted info data, because the InfoSvnCommand argument is mishandled. Note: This has been disputed by multiple third parties as not being reproduceable and they argue this is not a valid vulnerability. | 2022-10-02T00:00:00.000Z | 2025-10-01T23:11:25.000Z |
| msrc_cve-2022-43410 | Jenkins Mercurial Plugin 1251.va_b_121f184902 and earlier provides information about which jobs were triggered or scheduled for polling through its webhook endpoint, including jobs the user has no permission to access. | 2022-10-02T00:00:00.000Z | 2025-10-01T23:11:26.000Z |
| msrc_cve-2022-43680 | In libexpat through 2.4.9 there is a use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate in out-of-memory situations. | 2022-10-02T00:00:00.000Z | 2026-02-18T14:05:21.000Z |
| msrc_cve-2022-43750 | drivers/usb/mon/mon_bin.c in usbmon in the Linux kernel before 5.19.15 and 6.x before 6.0.1 allows a user-space client to corrupt the monitor's internal memory. | 2022-10-02T00:00:00.000Z | 2022-10-29T00:00:00.000Z |
| msrc_cve-2022-44032 | An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4000_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open() aka a race condition between cmm_open() and cm4000_detach(). | 2022-10-02T00:00:00.000Z | 2022-11-09T00:00:00.000Z |
| msrc_cve-2022-44033 | An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4040_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open() aka a race condition between cm4040_open() and reader_detach(). | 2022-10-02T00:00:00.000Z | 2022-11-09T00:00:00.000Z |
| msrc_cve-2022-44034 | An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/scr24x_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open() aka a race condition between scr24x_open() and scr24x_remove(). | 2022-10-02T00:00:00.000Z | 2022-11-09T00:00:00.000Z |
| msrc_cve-2022-22035 | Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability | 2022-10-11T07:00:00.000Z | 2022-10-11T07:00:00.000Z |
| msrc_cve-2022-24504 | Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability | 2022-10-11T07:00:00.000Z | 2022-10-11T07:00:00.000Z |
| msrc_cve-2022-30198 | Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability | 2022-10-11T07:00:00.000Z | 2022-10-11T07:00:00.000Z |
| msrc_cve-2022-33634 | Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability | 2022-10-11T07:00:00.000Z | 2022-10-11T07:00:00.000Z |
| msrc_cve-2022-33635 | Windows GDI+ Remote Code Execution Vulnerability | 2022-10-11T07:00:00.000Z | 2022-10-11T07:00:00.000Z |
| msrc_cve-2022-33645 | Windows TCP/IP Driver Denial of Service Vulnerability | 2022-10-11T07:00:00.000Z | 2022-10-11T07:00:00.000Z |
| msrc_cve-2022-34689 | Windows CryptoAPI Spoofing Vulnerability | 2022-10-11T07:00:00.000Z | 2022-10-11T07:00:00.000Z |
| msrc_cve-2022-35770 | Windows NTLM Spoofing Vulnerability | 2022-10-11T07:00:00.000Z | 2022-10-11T07:00:00.000Z |
| msrc_cve-2022-35829 | Service Fabric Explorer Spoofing Vulnerability | 2022-10-11T07:00:00.000Z | 2022-10-11T07:00:00.000Z |
| msrc_cve-2022-37965 | Windows Point-to-Point Tunneling Protocol Denial of Service Vulnerability | 2022-10-11T07:00:00.000Z | 2022-10-11T07:00:00.000Z |
| msrc_cve-2022-37968 | Azure Arc-enabled Kubernetes cluster Connect Elevation of Privilege Vulnerability | 2022-10-11T07:00:00.000Z | 2022-10-11T07:00:00.000Z |
| msrc_cve-2022-37970 | Windows DWM Core Library Elevation of Privilege Vulnerability | 2022-10-11T07:00:00.000Z | 2022-10-11T07:00:00.000Z |
| msrc_cve-2022-37971 | Microsoft Windows Defender Elevation of Privilege Vulnerability | 2022-10-11T07:00:00.000Z | 2022-10-17T07:00:00.000Z |
| msrc_cve-2022-37973 | Windows Local Session Manager (LSM) Denial of Service Vulnerability | 2022-10-11T07:00:00.000Z | 2022-11-08T08:00:00.000Z |
| msrc_cve-2022-37974 | Windows Mixed Reality Developer Tools Information Disclosure Vulnerability | 2022-10-11T07:00:00.000Z | 2022-10-11T07:00:00.000Z |
| msrc_cve-2022-37975 | Windows Group Policy Elevation of Privilege Vulnerability | 2022-10-11T07:00:00.000Z | 2022-11-08T08:00:00.000Z |
| msrc_cve-2022-37976 | Active Directory Certificate Services Elevation of Privilege Vulnerability | 2022-10-11T07:00:00.000Z | 2022-10-18T07:00:00.000Z |
| msrc_cve-2022-37977 | Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability | 2022-10-11T07:00:00.000Z | 2022-10-11T07:00:00.000Z |
| msrc_cve-2022-37978 | Windows Active Directory Certificate Services Security Feature Bypass | 2022-10-11T07:00:00.000Z | 2022-10-11T07:00:00.000Z |
| msrc_cve-2022-37979 | Windows Hyper-V Elevation of Privilege Vulnerability | 2022-10-11T07:00:00.000Z | 2022-10-11T07:00:00.000Z |
| msrc_cve-2022-37980 | Windows DHCP Client Elevation of Privilege Vulnerability | 2022-10-11T07:00:00.000Z | 2022-10-11T07:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2023:0209-1 | Security update for trytond | 2023-08-06T14:01:38Z | 2023-08-06T14:01:38Z |
| opensuse-su-2023:0213-1 | Security update for virtualbox | 2023-08-06T16:21:12Z | 2023-08-06T16:21:12Z |
| opensuse-su-2023:0215-1 | Security update for perl-Net-Netmask | 2023-08-07T04:01:39Z | 2023-08-07T04:01:39Z |
| opensuse-su-2023:0216-1 | Security update for chromium | 2023-08-07T10:48:54Z | 2023-08-07T10:48:54Z |
| opensuse-su-2023:0217-1 | Security update for perl-Net-Netmask | 2023-08-07T12:01:29Z | 2023-08-07T12:01:29Z |
| opensuse-su-2023:0219-1 | Security update for opensuse-welcome | 2023-08-14T13:45:38Z | 2023-08-14T13:45:38Z |
| opensuse-su-2023:0222-1 | Security update for perl-HTTP-Tiny | 2023-08-15T12:01:47Z | 2023-08-15T12:01:47Z |
| opensuse-su-2023:0223-1 | Security update for perl-HTTP-Tiny | 2023-08-15T12:01:51Z | 2023-08-15T12:01:51Z |
| opensuse-su-2023:0225-1 | Security update for perl-Cpanel-JSON-XS | 2023-08-17T10:02:27Z | 2023-08-17T10:02:27Z |
| opensuse-su-2023:0230-1 | Security update for opensuse-welcome | 2023-08-18T10:02:39Z | 2023-08-18T10:02:39Z |
| opensuse-su-2023:0232-1 | Security update for python-mitmproxy | 2023-08-20T10:01:55Z | 2023-08-20T10:01:55Z |
| opensuse-su-2023:0233-1 | Security update for python-mitmproxy | 2023-08-20T10:01:58Z | 2023-08-20T10:01:58Z |
| opensuse-su-2023:0234-1 | Security update for chromium | 2023-08-21T09:53:00Z | 2023-08-21T09:53:00Z |
| opensuse-su-2023:0237-1 | Security update for chromium | 2023-08-28T15:17:03Z | 2023-08-28T15:17:03Z |
| opensuse-su-2023:0244-1 | Security update for chromium | 2023-09-06T07:06:29Z | 2023-09-06T07:06:29Z |
| opensuse-su-2023:0245-1 | Security update for chromium | 2023-09-12T08:35:17Z | 2023-09-12T08:35:17Z |
| opensuse-su-2023:0246-1 | Security update for chromium | 2023-09-13T11:45:11Z | 2023-09-13T11:45:11Z |
| opensuse-su-2023:0247-1 | Security update for chromium | 2023-09-15T06:47:49Z | 2023-09-15T06:47:49Z |
| opensuse-su-2023:0249-1 | Security update for chromium | 2023-09-19T09:25:09Z | 2023-09-19T09:25:09Z |
| opensuse-su-2023:0251-1 | Security update for opera | 2023-09-23T12:02:01Z | 2023-09-23T12:02:01Z |
| opensuse-su-2023:0253-1 | Security update for renderdoc | 2023-09-25T10:02:37Z | 2023-09-25T10:02:37Z |
| opensuse-su-2023:0257-1 | Security update for modsecurity | 2023-09-25T12:02:08Z | 2023-09-25T12:02:08Z |
| opensuse-su-2023:0259-1 | Security update for python-GitPython | 2023-09-25T12:02:14Z | 2023-09-25T12:02:14Z |
| opensuse-su-2023:0260-1 | Security update for python-CairoSVG | 2023-09-25T12:02:25Z | 2023-09-25T12:02:25Z |
| opensuse-su-2023:0267-1 | Security update for tcpreplay | 2023-09-25T22:01:50Z | 2023-09-25T22:01:50Z |
| opensuse-su-2023:0269-1 | Security update for modsecurity | 2023-09-25T22:01:56Z | 2023-09-25T22:01:56Z |
| opensuse-su-2023:0270-1 | Security update for Cadence | 2023-09-25T22:01:59Z | 2023-09-25T22:01:59Z |
| opensuse-su-2023:0271-1 | Security update for python-GitPython | 2023-09-25T22:02:02Z | 2023-09-25T22:02:02Z |
| opensuse-su-2023:0272-1 | Security update for python-CairoSVG | 2023-09-25T22:02:13Z | 2023-09-25T22:02:13Z |
| opensuse-su-2023:0275-1 | Security update for cacti, cacti-spine | 2023-09-26T13:31:33Z | 2023-09-26T13:31:33Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2013:0645 | Red Hat Security Advisory: apache-cxf security update | 2013-03-13T18:43:00+00:00 | 2026-01-28T22:54:22+00:00 |
| rhsa-2013:0644 | Red Hat Security Advisory: apache-cxf security update | 2013-03-13T18:45:00+00:00 | 2026-01-28T22:54:20+00:00 |
| rhsa-2013:0648 | Red Hat Security Advisory: jbossweb security update | 2013-03-14T16:40:00+00:00 | 2026-01-28T22:54:21+00:00 |
| rhsa-2013:0649 | Red Hat Security Advisory: Fuse ESB Enterprise 7.1.0 update | 2013-03-14T16:40:00+00:00 | 2026-01-28T22:54:21+00:00 |
| rhsa-2013:0646 | Red Hat Security Advisory: pidgin security update | 2013-03-14T16:45:00+00:00 | 2025-11-21T17:43:07+00:00 |
| rhsa-2013:0647 | Red Hat Security Advisory: jbossweb security update | 2013-03-14T16:46:00+00:00 | 2026-01-28T22:54:20+00:00 |
| rhsa-2013:0656 | Red Hat Security Advisory: krb5 security update | 2013-03-18T17:51:00+00:00 | 2025-11-21T17:43:08+00:00 |
| rhsa-2013:0661 | Red Hat Security Advisory: kernel security and bug fix update | 2013-03-19T18:22:00+00:00 | 2025-11-21T17:43:09+00:00 |
| rhsa-2013:0662 | Red Hat Security Advisory: kernel security and bug fix update | 2013-03-19T18:23:00+00:00 | 2025-11-21T17:43:10+00:00 |
| rhsa-2013:0663 | Red Hat Security Advisory: sssd security and bug fix update | 2013-03-19T18:24:00+00:00 | 2025-11-21T17:43:10+00:00 |
| rhsa-2013:0665 | Red Hat Security Advisory: JBoss Data Grid 6.1.0 update | 2013-03-20T15:48:00+00:00 | 2026-01-28T22:54:22+00:00 |
| rhsa-2013:0666 | Red Hat Security Advisory: Oracle Java SE 6 - notification of end of public updates | 2013-03-20T15:58:00+00:00 | 2025-11-21T17:43:11+00:00 |
| rhsa-2013:0668 | Red Hat Security Advisory: boost security update | 2013-03-21T17:46:00+00:00 | 2025-11-21T17:43:11+00:00 |
| rhsa-2013:0657 | Red Hat Security Advisory: openstack-nova security, bug fix, and enhancement update | 2013-03-21T18:08:00+00:00 | 2026-01-28T22:34:44+00:00 |
| rhsa-2013:0658 | Red Hat Security Advisory: openstack-cinder security and enhancement update | 2013-03-21T18:08:00+00:00 | 2026-01-28T22:34:43+00:00 |
| rhsa-2013:0670 | Red Hat Security Advisory: Django security update | 2013-03-21T18:11:00+00:00 | 2026-01-28T22:34:43+00:00 |
| rhsa-2013:0671 | Red Hat Security Advisory: openstack-packstack security and bug fix update | 2013-03-21T18:13:00+00:00 | 2025-11-21T17:43:13+00:00 |
| rhsa-2013:0669 | Red Hat Security Advisory: qt security update | 2013-03-21T18:20:00+00:00 | 2025-11-21T17:43:12+00:00 |
| rhsa-2013:0679 | Red Hat Security Advisory: jakarta-commons-httpclient security update | 2013-03-25T17:03:00+00:00 | 2026-01-28T20:25:32+00:00 |
| rhsa-2013:0680 | Red Hat Security Advisory: jakarta-commons-httpclient security update | 2013-03-25T17:04:00+00:00 | 2026-01-28T20:25:32+00:00 |
| rhsa-2013:0681 | Red Hat Security Advisory: jakarta-commons-httpclient security update | 2013-03-25T17:04:00+00:00 | 2026-01-28T20:25:33+00:00 |
| rhsa-2013:0682 | Red Hat Security Advisory: jakarta-commons-httpclient security update | 2013-03-25T17:05:00+00:00 | 2026-01-28T20:25:36+00:00 |
| rhsa-2013:0683 | Red Hat Security Advisory: axis security update | 2013-03-25T17:09:00+00:00 | 2025-11-21T17:43:15+00:00 |
| rhsa-2013:0686 | Red Hat Security Advisory: Subscription Asset Manager 1.2.1 update | 2013-03-26T19:10:00+00:00 | 2026-04-28T06:26:20+00:00 |
| rhsa-2013:0685 | Red Hat Security Advisory: perl security update | 2013-03-26T19:21:00+00:00 | 2026-04-19T19:43:53+00:00 |
| rhsa-2013:0687 | Red Hat Security Advisory: pixman security update | 2013-03-27T18:51:00+00:00 | 2025-11-21T17:43:17+00:00 |
| rhsa-2013:0688 | Red Hat Security Advisory: Red Hat Enterprise Linux Advanced Mission Critical 5.3 1-Year Notice | 2013-03-28T21:51:00+00:00 | 2025-11-21T17:43:21+00:00 |
| rhsa-2013:0690 | Red Hat Security Advisory: bind97 security update | 2013-03-28T21:58:00+00:00 | 2025-11-21T17:43:18+00:00 |
| rhsa-2013:0689 | Red Hat Security Advisory: bind security and bug fix update | 2013-03-28T21:59:00+00:00 | 2025-11-21T17:43:17+00:00 |
| rhsa-2013:0691 | Red Hat Security Advisory: Red Hat Storage 2.0 security, bug fix, and enhancement update #4 | 2013-03-28T22:14:00+00:00 | 2026-01-28T22:34:43+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2018:2364-1 | Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP1) | 2018-08-16T06:06:23Z | 2018-08-16T06:06:23Z |
| suse-su-2018:2348-1 | Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP1) | 2018-08-16T06:06:28Z | 2018-08-16T06:06:28Z |
| suse-su-2018:2368-1 | Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP1) | 2018-08-16T06:06:33Z | 2018-08-16T06:06:33Z |
| suse-su-2018:2363-1 | Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP1) | 2018-08-16T06:06:39Z | 2018-08-16T06:06:39Z |
| suse-su-2018:2359-1 | Security update for the Linux Kernel (Live Patch 24 for SLE 12 SP1) | 2018-08-16T06:06:44Z | 2018-08-16T06:06:44Z |
| suse-su-2018:2367-1 | Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP1) | 2018-08-16T06:06:49Z | 2018-08-16T06:06:49Z |
| suse-su-2018:2353-1 | Security update for the Linux Kernel (Live Patch 22 for SLE 12 SP1) | 2018-08-16T06:06:54Z | 2018-08-16T06:06:54Z |
| suse-su-2018:2350-1 | Security update for the Linux Kernel (Live Patch 21 for SLE 12 SP1) | 2018-08-16T06:06:59Z | 2018-08-16T06:06:59Z |
| suse-su-2018:2355-1 | Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP1) | 2018-08-16T06:07:04Z | 2018-08-16T06:07:04Z |
| suse-su-2018:2344-1 | Security update for the Linux Kernel | 2018-08-16T07:06:02Z | 2018-08-16T07:06:02Z |
| suse-su-2018:2366-1 | Security update for the Linux Kernel | 2018-08-16T07:07:31Z | 2018-08-16T07:07:31Z |
| suse-su-2018:2362-1 | Security update for the Linux Kernel | 2018-08-16T07:08:37Z | 2018-08-16T07:08:37Z |
| suse-su-2018:2374-1 | Security update for the Linux Kernel | 2018-08-16T09:37:31Z | 2018-08-16T09:37:31Z |
| suse-su-2018:2381-1 | Security update for the Linux Kernel | 2018-08-16T12:30:04Z | 2018-08-16T12:30:04Z |
| suse-su-2018:2380-1 | Security update for the Linux Kernel | 2018-08-16T12:30:10Z | 2018-08-16T12:30:10Z |
| suse-su-2018:2394-1 | Security update for kgraft | 2018-08-16T13:46:00Z | 2018-08-16T13:46:00Z |
| suse-su-2018:2390-1 | Security update for GraphicsMagick | 2018-08-16T14:55:21Z | 2018-08-16T14:55:21Z |
| suse-su-2018:2388-1 | Security update for perl-Archive-Zip | 2018-08-16T14:55:36Z | 2018-08-16T14:55:36Z |
| suse-su-2018:2385-1 | Security update for perl-Archive-Zip | 2018-08-16T14:55:48Z | 2018-08-16T14:55:48Z |
| suse-su-2018:2386-1 | Security update for perl-Archive-Zip | 2018-08-16T14:55:56Z | 2018-08-16T14:55:56Z |
| suse-su-2018:2384-1 | Security update for the Linux Kernel | 2018-08-16T15:43:46Z | 2018-08-16T15:43:46Z |
| suse-su-2018:2389-1 | Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP2) | 2018-08-16T15:59:53Z | 2018-08-16T15:59:53Z |
| suse-su-2018:2387-1 | Security update for the Linux Kernel (Live Patch 13 for SLE 12 SP2) | 2018-08-16T16:00:10Z | 2018-08-16T16:00:10Z |
| suse-su-2018:2391-1 | Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP2) | 2018-08-16T16:00:22Z | 2018-08-16T16:00:22Z |
| suse-su-2018:2403-1 | Security update for mutt | 2018-08-17T06:54:36Z | 2018-08-17T06:54:36Z |
| suse-su-2018:2401-1 | Security update for xen | 2018-08-17T06:54:52Z | 2018-08-17T06:54:52Z |
| suse-su-2018:2408-1 | Security update for python | 2018-08-17T08:41:29Z | 2018-08-17T08:41:29Z |
| suse-su-2018:2409-1 | Security update for xen | 2018-08-17T11:42:30Z | 2018-08-17T11:42:30Z |
| suse-su-2018:2410-1 | Security update for xen | 2018-08-17T11:42:41Z | 2018-08-17T11:42:41Z |
| suse-su-2018:2411-1 | Security update for mysql | 2018-08-17T12:47:00Z | 2018-08-17T12:47:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:3066 | Moderate: kernel security update | 2026-02-23T00:00:00Z | 2026-02-26T10:43:00Z |
| alsa-2026:3067 | Important: freerdp security update | 2026-02-23T00:00:00Z | 2026-02-26T10:36:11Z |
| alsa-2026:3068 | Important: freerdp security update | 2026-02-23T00:00:00Z | 2026-02-26T10:34:44Z |
| alsa-2026:3083 | Important: kernel security update | 2026-02-23T00:00:00Z | 2026-02-24T12:59:25Z |
| alsa-2026:3092 | Important: golang-github-openprinting-ipp-usb security update | 2026-02-23T00:00:00Z | 2026-02-26T10:33:21Z |
| alsa-2026:3094 | Important: protobuf security update | 2026-02-23T00:00:00Z | 2026-02-24T00:07:41Z |
| alsa-2026:3095 | Important: protobuf security update | 2026-02-23T00:00:00Z | 2026-02-24T00:13:34Z |
| alsa-2026:3110 | Important: kernel-rt security update | 2026-02-23T00:00:00Z | 2026-02-24T13:03:08Z |
| alsa-2026:3187 | Important: grafana-pcp security update | 2026-02-24T00:00:00Z | 2026-02-24T17:14:01Z |
| alsa-2026:3188 | Important: grafana security update | 2026-02-24T00:00:00Z | 2026-02-24T17:11:47Z |
| alsa-2026:3189 | Moderate: 389-ds-base security update | 2026-02-24T00:00:00Z | 2026-02-26T10:31:32Z |
| alsa-2026:3208 | Moderate: 389-ds-base security update | 2026-02-24T00:00:00Z | 2026-02-26T10:30:07Z |
| alsa-2026:3275 | Moderate: kernel security update | 2026-02-25T00:00:00Z | 2026-03-02T13:07:09Z |
| alsa-2026:3291 | Important: runc security update | 2026-02-25T00:00:00Z | 2026-02-26T10:27:56Z |
| alsa-2026:3297 | Important: buildah security update | 2026-02-25T00:00:00Z | 2026-02-26T10:26:55Z |
| alsa-2026:3298 | Important: buildah security update | 2026-02-25T00:00:00Z | 2026-02-26T10:25:19Z |
| alsa-2026:3334 | Important: freerdp security update | 2026-02-25T00:00:00Z | 2026-02-26T09:39:13Z |
| alsa-2026:3336 | Important: podman security update | 2026-02-25T00:00:00Z | 2026-02-26T13:31:46Z |
| alsa-2026:3337 | Important: podman security update | 2026-02-25T00:00:00Z | 2026-02-26T10:23:45Z |
| alsa-2026:3338 | Important: firefox security update | 2026-02-25T00:00:00Z | 2026-03-02T12:54:29Z |
| alsa-2026:3339 | Important: firefox security update | 2026-02-25T00:00:00Z | 2026-02-26T10:21:52Z |
| alsa-2026:3340 | Important: skopeo security update | 2026-02-25T00:00:00Z | 2026-03-02T12:57:45Z |
| alsa-2026:3341 | Important: containernetworking-plugins security update | 2026-02-25T00:00:00Z | 2026-03-02T12:59:54Z |
| alsa-2026:3343 | Important: skopeo security update | 2026-02-25T00:00:00Z | 2026-02-26T13:30:14Z |
| alsa-2026:3354 | Important: python-pyasn1 security update | 2026-02-25T00:00:00Z | 2026-02-26T13:28:33Z |
| alsa-2026:3359 | Important: python-pyasn1 security update | 2026-02-25T00:00:00Z | 2026-02-26T10:19:52Z |
| alsa-2026:3361 | Important: firefox security update | 2026-02-25T00:00:00Z | 2026-02-26T10:18:27Z |
| alsa-2026:3405 | Important: libpng security update | 2026-02-26T00:00:00Z | 2026-03-02T13:11:42Z |
| alsa-2026:3407 | Important: mingw-fontconfig security update | 2026-02-26T00:00:00Z | 2026-03-02T15:16:03Z |
| alsa-2026:3428 | Important: container-tools:rhel8 security update | 2026-02-26T00:00:00Z | 2026-03-02T15:20:08Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2024-81 | Heap-use-after-free in xmlRemoveID | 2024-02-08T00:02:18.078478Z | 2024-02-08T00:02:18.079086Z |
| osv-2024-82 | Heap-use-after-free in xmlValidatePopElement | 2024-02-08T00:02:35.342535Z | 2024-02-08T00:02:35.343044Z |
| osv-2024-85 | Security exception in com.github.javaparser.ast.validator.TreeVisitorValidator.accept | 2024-02-08T00:13:58.690460Z | 2026-01-13T04:47:29.127821Z |
| osv-2024-86 | Security exception in org.threeten.bp.format.DateTimeFormatterBuilder$CompositePrinterParser.parse | 2024-02-09T00:00:11.154046Z | 2025-09-25T14:31:01.295253Z |
| osv-2024-88 | Heap-use-after-free in fuzzer_execute_ex | 2024-02-09T00:02:29.396272Z | 2024-02-09T00:02:29.396615Z |
| osv-2024-89 | Security exception in com.puppycrawl.tools.checkstyle.JavaAstVisitor.getInnerBopAst | 2024-02-09T00:03:08.288815Z | 2024-04-01T14:22:58.864850Z |
| osv-2024-96 | Heap-buffer-overflow in mrb_memsearch | 2024-02-11T00:00:45.699847Z | 2024-02-14T14:17:20.000446Z |
| osv-2024-98 | UNKNOWN READ in PackLinuxElf32::adjABS | 2024-02-11T00:14:29.715614Z | 2024-04-29T11:31:53.382431Z |
| osv-2024-102 | Heap-buffer-overflow in mrb_memsearch | 2024-02-15T00:00:47.674187Z | 2024-02-15T00:00:47.674761Z |
| osv-2024-103 | Heap-use-after-free in xmlRemoveID | 2024-02-15T00:00:51.271367Z | 2024-02-15T00:00:51.271973Z |
| osv-2024-104 | Heap-buffer-overflow in mrb_memsearch | 2024-02-15T00:00:54.473735Z | 2024-02-15T00:00:54.474295Z |
| osv-2024-112 | Stack-overflow in boost::read_graphviz_detail::parser::parse_subgraph | 2024-02-16T00:05:47.896843Z | 2026-04-24T14:13:21.773842Z |
| osv-2024-114 | Segv on unknown address in lj_BC_RET1 | 2024-02-17T00:12:33.617106Z | 2024-04-17T14:24:32.039372Z |
| osv-2024-117 | Security exception in com.spotify.docker.client.shaded.com.fasterxml.jackson.databind.util.TokenBuffer | 2024-02-19T00:05:05.793082Z | 2024-02-19T00:05:05.793781Z |
| osv-2024-118 | Heap-buffer-overflow in sav_process_row | 2024-02-20T00:01:08.095087Z | 2024-04-29T11:19:02.854462Z |
| osv-2024-120 | Security exception in com.spotify.docker.client.shaded.com.fasterxml.jackson.databind.util.TokenBuffer | 2024-02-21T00:00:31.892843Z | 2024-02-21T00:00:31.893273Z |
| osv-2024-123 | Heap-use-after-free in dxf_tables_read | 2024-02-22T00:12:27.847169Z | 2024-04-29T11:24:19.340311Z |
| osv-2024-135 | Heap-buffer-overflow in BS_ReadByte | 2024-02-25T00:05:28.923786Z | 2024-04-18T14:10:11.037617Z |
| osv-2024-137 | Global-buffer-overflow in igraph_dl_yylex | 2024-02-27T00:01:01.786536Z | 2024-04-03T14:17:44.548648Z |
| osv-2024-138 | Security exception in com.github.javaparser.GeneratedJavaParser.Expression | 2024-02-28T00:05:23.810172Z | 2024-04-04T14:17:31.086359Z |
| osv-2024-140 | Container-overflow in WasmEdge::LLVM::Compiler::compile | 2024-02-28T00:12:59.500279Z | 2024-04-29T11:16:32.126190Z |
| osv-2024-142 | Heap-buffer-overflow in gf_gz_decompress_payload_ex | 2024-02-29T00:06:19.763458Z | 2024-04-18T14:20:45.279874Z |
| osv-2024-144 | UNKNOWN READ in spvtools::val::ValidateAccessChain | 2024-02-29T00:12:28.292465Z | 2024-04-23T14:17:09.435427Z |
| osv-2024-149 | Heap-use-after-free in get_ls_tile_buffers | 2024-03-07T00:01:26.874963Z | 2024-04-24T14:25:20.329505Z |
| osv-2024-151 | Heap-buffer-overflow in od_ec_dec_normalize | 2024-03-07T00:04:15.146851Z | 2024-04-24T14:26:12.240231Z |
| osv-2024-153 | Heap-buffer-overflow in od_ec_dec_init | 2024-03-07T00:13:48.067527Z | 2024-04-24T14:26:37.406573Z |
| osv-2024-156 | Stack-buffer-overflow in rtpin_satip_get_server_ip | 2024-03-10T00:01:41.405747Z | 2024-04-18T14:21:00.600694Z |
| osv-2024-157 | Heap-buffer-overflow in gf_strmemstr | 2024-03-10T00:06:03.489792Z | 2024-04-18T14:20:28.786302Z |
| osv-2024-161 | Heap-buffer-overflow in pcre2_fuzzsupport.c | 2024-03-11T00:00:35.333844Z | 2024-03-11T00:00:35.334478Z |
| osv-2024-163 | Stack-buffer-overflow in H5S_get_simple_extent_dims | 2024-03-12T00:05:38.587103Z | 2024-04-29T11:18:04.652469Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-gitlab-2024-9164 | Missing Authentication for Critical Function in GitLab | 2024-10-15T19:13:02.001Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-8970 | Incorrect Authorization in GitLab | 2024-10-15T19:13:25.413Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-5005 | Incorrect Provision of Specified Functionality in GitLab | 2024-10-15T19:18:05.224Z | 2025-05-20T10:02:07.006Z |
| bit-dotnet-2024-38229 | .NET and Visual Studio Remote Code Execution Vulnerability | 2024-10-17T19:11:02.919Z | 2025-05-20T10:02:07.006Z |
| bit-solr-2024-45217 | Apache Solr: ConfigSets created during a backup restore command are trusted implicitly | 2024-10-18T07:18:24.823Z | 2025-05-20T10:02:07.006Z |
| bit-solr-2024-45216 | Apache Solr: Authentication bypass possible using a fake URL Path ending | 2024-10-18T07:18:31.999Z | 2025-05-20T10:02:07.006Z |
| bit-wordpress-2022-4973 | WordPress Core < 6.0.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via use of the_meta(); function | 2024-10-18T07:22:50.306Z | 2025-05-20T10:02:07.006Z |
| bit-django-2024-45231 | 2024-10-19T07:08:43.877Z | 2025-09-03T11:06:29.028Z | |
| bit-django-2024-45230 | 2024-10-19T07:08:51.488Z | 2025-09-03T11:06:29.028Z | |
| bit-dotnet-2024-43485 | .NET and Visual Studio Denial of Service Vulnerability | 2024-10-22T07:08:41.106Z | 2025-05-20T10:02:07.006Z |
| bit-dotnet-2024-43484 | .NET, .NET Framework, and Visual Studio Denial of Service Vulnerability | 2024-10-22T07:09:04.708Z | 2025-05-20T10:02:07.006Z |
| bit-dotnet-2024-43483 | .NET, .NET Framework, and Visual Studio Denial of Service Vulnerability | 2024-10-22T07:09:27.117Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2024-9264 | Grafana SQL Expressions allow for remote code execution | 2024-10-22T07:09:52.003Z | 2025-05-20T10:02:07.006Z |
| bit-haproxy-2024-49214 | 2024-10-22T11:56:51.321Z | 2025-04-03T14:40:37.652Z | |
| bit-python-2023-27043 | 2024-10-22T12:06:11.918Z | 2025-11-06T13:25:46.476Z | |
| bit-cilium-2024-47825 | CIDR deny policies may not take effect when a more narrow CIDR allow is present | 2024-10-23T07:08:30.083Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2023-5122 | SSRF in CSV Datasource Plugin | 2024-10-24T07:10:55.187Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-8312 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2024-10-26T07:10:33.009Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-6826 | Allocation of Resources Without Limits or Throttling in GitLab | 2024-10-26T07:11:57.115Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2024-10452 | 2024-10-31T07:09:47.399Z | 2026-02-11T09:09:18.507Z | |
| bit-consul-2024-10086 | Consul Vulnerable To Reflected XSS On Content-Type Error Manipulation | 2024-11-01T07:07:47.800Z | 2025-05-20T10:02:07.006Z |
| bit-consul-2024-10006 | Consul L7 Intentions Vulnerable To Headers Bypass | 2024-11-01T07:07:54.503Z | 2025-05-20T10:02:07.006Z |
| bit-consul-2024-10005 | Consul L7 Intentions Vulnerable To URL Path Bypass | 2024-11-01T07:08:02.109Z | 2025-05-20T10:02:07.006Z |
| bit-vault-2024-8185 | Vault Vulnerable to Denial of Service When Processing Raft Join Requests | 2024-11-02T07:20:15.411Z | 2025-08-05T09:07:53.274Z |
| bit-gitlab-2022-4315 | 2024-11-05T07:26:59.363Z | 2024-11-27T19:40:48.342Z | |
| bit-appsmith-2024-51408 | 2024-11-07T07:07:47.085Z | 2025-04-03T14:40:37.652Z | |
| bit-mongodb-2024-8305 | MongoDB Server secondaries may crash due to forced index constraints | 2024-11-08T07:12:18.219Z | 2025-05-20T10:02:07.006Z |
| bit-rabbitmq-2024-51988 | HTTP API's queue deletion endpoint does not verify that the user has a required permission | 2024-11-08T07:17:02.800Z | 2025-05-20T10:02:07.006Z |
| bit-alertmanager-2023-40577 | Alertmanager UI is vulnerable to stored XSS via the /api/v1/alerts endpoint | 2024-11-08T19:09:34.789Z | 2025-05-20T10:02:07.006Z |
| bit-memcached-2023-46853 | 2024-11-08T19:13:57.572Z | 2025-04-03T14:40:37.652Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2008-avi-418 | Multiples vulnérabilités dans Drupal | 2008-08-14T00:00:00.000000 | 2008-08-14T00:00:00.000000 |
| certa-2008-avi-419 | Vulnérabilité dans Symantec Storage Foundation for Windows | 2008-08-18T00:00:00.000000 | 2008-08-18T00:00:00.000000 |
| certa-2008-avi-420 | Vulnérabilités de Postfix | 2008-08-19T00:00:00.000000 | 2008-08-19T00:00:00.000000 |
| certa-2008-avi-421 | Vulnérabilité de VMware VirtualCenter | 2008-08-19T00:00:00.000000 | 2008-08-19T00:00:00.000000 |
| certa-2008-avi-422 | Multiples vulnérabilités dans xine | 2008-08-19T00:00:00.000000 | 2008-08-19T00:00:00.000000 |
| certa-2008-avi-423 | Vulnérabilité dans Ovidentia | 2008-08-20T00:00:00.000000 | 2008-08-20T00:00:00.000000 |
| certa-2008-avi-424 | Vulnérabilité dans GnuTLS | 2008-08-20T00:00:00.000000 | 2008-08-20T00:00:00.000000 |
| certa-2008-avi-425 | Vulnérabilité dans IBM WebSphere | 2008-08-20T00:00:00.000000 | 2008-08-20T00:00:00.000000 |
| certa-2008-avi-426 | Multiples vulnérabilités dans Opera | 2008-08-20T00:00:00.000000 | 2008-08-20T00:00:00.000000 |
| certa-2008-avi-427 | Vulnérabilité dans divers produits Trend Micro | 2008-08-22T00:00:00.000000 | 2008-08-22T00:00:00.000000 |
| certa-2008-avi-428 | Vulnérabilités dans des mises à jour d'OpenSSH sous Red Hat | 2008-08-22T00:00:00.000000 | 2008-08-29T00:00:00.000000 |
| certa-2008-avi-429 | Vulnérabilité de Xen | 2008-08-27T00:00:00.000000 | 2008-08-27T00:00:00.000000 |
| certa-2008-avi-430 | Vulnérabilité dans Ruby | 2008-08-27T00:00:00.000000 | 2008-08-27T00:00:00.000000 |
| certa-2008-avi-431 | Vulnérabilité de IBM DB2 | 2008-08-27T00:00:00.000000 | 2008-08-27T00:00:00.000000 |
| certa-2008-avi-432 | Vulnérabilités dans Red Hat Directory Server | 2008-08-29T00:00:00.000000 | 2008-08-29T00:00:00.000000 |
| certa-2008-avi-433 | Vulnérabilité dans libxml2 | 2008-08-29T00:00:00.000000 | 2008-08-29T00:00:00.000000 |
| certa-2008-avi-434 | Vulnérabilité de HP Enterprise Discovery | 2008-08-29T00:00:00.000000 | 2008-08-29T00:00:00.000000 |
| certa-2008-avi-435 | Vulnérabilités de AWStats Totals | 2008-09-02T00:00:00.000000 | 2008-09-02T00:00:00.000000 |
| certa-2008-avi-436 | Vulnérabilité dans IBM WebSphere | 2008-09-02T00:00:00.000000 | 2008-09-02T00:00:00.000000 |
| certa-2008-avi-437 | Vulnérabilité dans ClamAV | 2008-09-04T00:00:00.000000 | 2008-09-04T00:00:00.000000 |
| certa-2008-avi-438 | Vulnérabilité dans IBM AIX | 2008-09-04T00:00:00.000000 | 2008-09-04T00:00:00.000000 |
| certa-2008-avi-439 | Vulnérabilité du noyau FreeBSD pour plateforme amd64 | 2008-09-04T00:00:00.000000 | 2008-09-04T00:00:00.000000 |
| certa-2008-avi-440 | Multiples vulnérabilités dans VLC | 2008-09-04T00:00:00.000000 | 2008-09-04T00:00:00.000000 |
| certa-2008-avi-441 | Multiples vulnérabilités des équipements Cisco ASA et PIX. | 2008-09-04T00:00:00.000000 | 2008-09-04T00:00:00.000000 |
| certa-2008-avi-442 | Multiples vulnérabilités dans Novell eDirectory | 2008-09-04T00:00:00.000000 | 2008-09-04T00:00:00.000000 |
| certa-2008-avi-443 | Vulnérabilité dans OpenOffice.org | 2008-09-04T00:00:00.000000 | 2008-09-04T00:00:00.000000 |
| certa-2008-avi-444 | Multiples vulnérabilités dans Wireshark | 2008-09-04T00:00:00.000000 | 2008-09-04T00:00:00.000000 |
| certa-2008-avi-445 | Multiples vulnérabilités dans les produits VMware | 2008-09-05T00:00:00.000000 | 2008-09-05T00:00:00.000000 |
| certa-2008-avi-446 | Vulnérabilité dans Cisco Secure ACS | 2008-09-05T00:00:00.000000 | 2008-09-05T00:00:00.000000 |
| certa-2008-avi-447 | Vulnérabilité dans libtiff | 2008-09-05T00:00:00.000000 | 2008-09-05T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2015-03349 | Google Chrome--size-limit value拒绝服务漏洞 | 2015-05-21 | 2015-05-26 |
| cnvd-2015-03350 | Google Chrome Blink缓冲区溢出漏洞 | 2015-05-21 | 2015-05-26 |
| cnvd-2015-03351 | Google Chrome Blink SVG内存错误引用漏洞 | 2015-05-21 | 2015-05-26 |
| cnvd-2015-03352 | Google Chrome内存错误引用漏洞(CNVD-2015-03352) | 2015-05-21 | 2015-05-26 |
| cnvd-2015-03353 | Google Chrome Blink同源策略绕过漏洞(CNVD-2015-03353) | 2015-05-21 | 2015-05-26 |
| cnvd-2015-03354 | Google Chrome Blink同源策略绕过漏洞(CNVD-2015-03354) | 2015-05-21 | 2015-05-26 |
| cnvd-2015-03355 | Google Chrome缓冲区溢出漏洞(CNVD-2015-03355) | 2015-05-21 | 2015-05-26 |
| cnvd-2015-03356 | Google Chrome内存错误引用漏洞(CNVD-2015-03356) | 2015-05-21 | 2015-05-26 |
| cnvd-2015-03361 | Cisco Email Security Appliance存在多个跨站脚本漏洞 | 2015-05-21 | 2015-05-27 |
| cnvd-2015-03362 | Docker Engine任意文件操作漏洞 | 2015-05-21 | 2015-05-27 |
| cnvd-2015-03363 | IBM License Metric Tool目录遍历漏洞 | 2015-05-21 | 2015-05-27 |
| cnvd-2015-03364 | IBM WebSphere MQ拒绝服务漏洞(CNVD-2015-03364) | 2015-05-21 | 2015-05-27 |
| cnvd-2015-03365 | Google V8存在未明漏洞(CNVD-2015-03365) | 2015-05-21 | 2015-05-27 |
| cnvd-2015-03366 | KCodes NetUSB module for Linux kernel堆栈缓冲区溢出漏洞 | 2015-05-21 | 2015-05-27 |
| cnvd-2015-03367 | TLS protocol中间人攻击漏洞 | 2015-05-21 | 2015-05-27 |
| cnvd-2015-03368 | Dell Sonicwall GMS AnalyzerUMA EM5000任意命令执行漏洞 | 2015-05-21 | 2015-05-27 |
| cnvd-2015-03369 | osCMax存在多个跨站请求伪造漏洞 | 2015-05-21 | 2015-05-27 |
| cnvd-2015-03370 | IBM Domino堆栈缓冲区溢出漏洞(CNVD-2015-03370) | 2015-05-21 | 2015-05-27 |
| cnvd-2015-03371 | IBM Domino堆栈缓冲区溢出漏洞(CNVD-2015-03371) | 2015-05-21 | 2015-05-27 |
| cnvd-2015-03372 | Google Chrome拒绝服务漏洞(CNVD-2015-03372) | 2015-05-21 | 2015-05-27 |
| cnvd-2015-03373 | Valve Steam拒绝服务漏洞 | 2015-05-21 | 2015-05-27 |
| cnvd-2015-03374 | Piriform CCleaner信息泄露漏洞 | 2015-05-21 | 2015-05-27 |
| cnvd-2015-03377 | MAS中国移动代理服务器SQL注入漏洞 | 2015-05-21 | 2015-07-06 |
| cnvd-2016-06663 | 五车信息技术(北京)有限公司图书馆系统文件上传漏洞 | 2015-05-21 | 2016-08-24 |
| cnvd-2016-06731 | 紫光防火墙某些版本存在远程命令执行漏洞 | 2015-05-24 | 2016-08-25 |
| cnvd-2015-03375 | WordPress Simple Backup插件'tools.php'任意文件下载漏洞 | 2015-05-25 | 2015-05-27 |
| cnvd-2015-03376 | Apple Safari ECDHE-ECDSA远程拒绝服务漏洞 | 2015-05-25 | 2015-05-27 |
| cnvd-2015-03443 | FUSE本地权限提升漏洞 | 2015-05-25 | 2015-05-29 |
| cnvd-2015-03390 | WordPress WP Membership插件安全绕过漏洞 | 2015-05-26 | 2015-05-28 |
| cnvd-2015-03391 | WordPress WP Fastest Cache插件跨站请求伪造漏洞 | 2015-05-26 | 2015-05-28 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2015-05666 | Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить доступность… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05667 | Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить доступность… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05668 | Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить доступность… | 28.04.2015 | 29.03.2021 |
| bdu:2015-05669 | Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить доступность… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05670 | Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить доступность… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05671 | Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить доступность… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05672 | Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить доступность… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05673 | Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить доступность… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05674 | Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить доступность… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05675 | Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить доступность… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05676 | Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить доступность… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05677 | Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить доступность… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05678 | Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить доступность… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05679 | Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить доступность… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05680 | Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциа… | 28.04.2015 | 05.07.2024 |
| bdu:2015-05681 | Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциа… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05682 | Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциа… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05683 | Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциа… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05684 | Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциа… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05685 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциа… | 28.04.2015 | 05.07.2024 |
| bdu:2015-05686 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциа… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05687 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциа… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05688 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциа… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05689 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциа… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05690 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциа… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05691 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциа… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05692 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциа… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05693 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциа… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05694 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциа… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05695 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциа… | 28.04.2015 | 28.11.2016 |
| ID | Description | Updated |
|---|---|---|
| var-201610-0718 | D-LinkDIR-632 is a wireless router manufactured by Friends. The product has a design flaw… | 2022-05-17T01:43:18.308000Z |
| var-201610-0695 | Zijinqiao monitoring configuration software is a general industrial configuration softwar… | 2022-05-17T01:43:18.319000Z |
| var-201609-0698 | Abilene Business Intelligence Gateway is a product of Beijing Hairui Xingye Technology Co… | 2022-05-17T01:43:18.407000Z |
| var-201608-0497 | The CiscoEPC3925 is a home router device. The CiscoEPC3925UPC has an insecure default pas… | 2022-05-17T01:43:18.510000Z |
| var-201605-0618 | OMRON CP1H-XA40DT-D is a compact PLC produced by Japan's Omron Corporation and is widely … | 2022-05-17T01:43:18.915000Z |
| var-201604-0693 | Chengdu Feiyuxing Technology Co., Ltd. is committed to providing intelligent and easy-to-… | 2022-05-17T01:43:19.043000Z |
| var-201602-0483 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable instan… | 2022-05-17T01:43:19.461000Z |
| var-201601-0746 | This vulnerability allows remote attackers to disclose information on vulnerable installa… | 2022-05-17T01:43:19.581000Z |
| var-201507-0709 | The D-Link DSP w110 is a socket that wirelessly controls the power switch. D-Link DSP-W h… | 2022-05-17T01:43:20.411000Z |
| var-201412-0695 | Multiple Hitachi Products are prone to a cross-site scripting vulnerability and an arbitr… | 2022-05-17T01:43:21.429000Z |
| var-201412-0629 | The Tecal E9000 Converged Architecture Blade Server is a new generation of powerful infra… | 2022-05-17T01:43:21.472000Z |
| var-201408-0479 | D-Link DNS-315L, DNS-320L, DNS-327L, DNS-340L, and DNS-345 are NAS network storage device… | 2022-05-17T01:43:22.279000Z |
| var-201407-0749 | The D-Link DIR series is a router device developed by D-LINK. Multiple D-Link DIR series … | 2022-05-17T01:43:22.395000Z |
| var-201404-0694 | The ICOMM 610 Wireless Modem has a cross-site request forgery vulnerability that allows r… | 2022-05-17T01:43:22.822000Z |
| var-201403-0550 | The Catalog Interface is a log that ensures trouble-free communication between the SAP sy… | 2022-05-17T01:43:23.183000Z |
| var-201312-0500 | SAP Customer Relationship Management is a customer relationship management solution. SAP … | 2022-05-17T01:43:23.753000Z |
| var-201310-0700 | The ADB Discus DRG A125G 'wansinglecfg.cmd' script has a security vulnerability that allo… | 2022-05-17T01:43:24.099000Z |
| var-201308-0460 | The TP-LINK TD-W8951ND Router is a wireless router device. TP-LINK TD-W8951ND Router Firm… | 2022-05-17T01:43:24.463000Z |
| var-201307-0540 | ALinking ALC-9451 and ALC-9452 Network Cameras are the network camera products of Taiwan … | 2022-05-17T01:43:24.827000Z |
| var-201305-0490 | TP-LINK TL-WR842ND is a wireless router product of China TP-LINK company. A directory tr… | 2022-05-17T01:43:25.160000Z |
| var-201305-0367 | Echelon i.LON is a smart energy management server. By default, multiple Echelon i.LON pro… | 2022-05-17T01:43:25.236000Z |
| var-201304-0476 | The TP-LINK TL-WR741N/TL-WR741ND incorrectly handles user-submitted requests, allowing re… | 2022-05-17T01:43:25.360000Z |
| var-201303-0457 | Polycom HDX Series devices are prone to an SQL-injection vulnerability because they fail … | 2022-05-17T01:43:25.548000Z |
| var-201302-0512 | The TP-LINK TL-WR2543ND is a wireless router device. TP-LINK TL-WR2543ND has multiple cro… | 2022-05-17T01:43:25.715000Z |
| var-201302-0489 | The Edimax EW-7206APg and EW-7209APg are wireless AP devices. Edimax EW-7206APg and EW-72… | 2022-05-17T01:43:25.741000Z |
| var-201302-0416 | There is a security vulnerability in SAP NetWeaver, and the application does not properly… | 2022-05-17T01:43:25.801000Z |
| var-201301-0543 | BT Home Hub is a wireless Internet router for home use. A buffer overflow vulnerability e… | 2022-05-17T01:43:25.959000Z |
| var-201301-0497 | The Netgear SPH200D is a dual mode cordless Skype phone. There are multiple input validat… | 2022-05-17T01:43:25.993000Z |
| var-201301-0476 | D-Link DCS is a camera device product. D-Link DCS web cameras allow unauthenticated attac… | 2022-05-17T01:43:28.756000Z |
| var-201211-0541 | Huawei Technologies Co., Ltd. is a private technology company headquartered in Shenzhen, … | 2022-05-17T01:43:29.255000Z |